Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 11:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bb2aade70a4850a195ef0c681dcfee20.exe
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
bb2aade70a4850a195ef0c681dcfee20.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
bb2aade70a4850a195ef0c681dcfee20.exe
-
Size
69KB
-
MD5
bb2aade70a4850a195ef0c681dcfee20
-
SHA1
a03d5f9e0ece2c6975bd1833d1cff6356ef216ab
-
SHA256
bd22827d1ed6ac4e0fa002309461d41a4046ca776b7f6070f5ddfe873825a242
-
SHA512
9fdae7e55a9aa252ac4f1136e60932b3d843abdb68f46527a453f3a09c5854767dede852ae18e2cf5eabc83a03b91c9eb37daa58e047156a02c9e86deae1b623
-
SSDEEP
1536:vsdlVVLac08TBTKBhSGho7Daml+EHRuCHMwas1hw85+el4:vsvVVLLdpKBdhm7xu4A85+el4
Score
6/10
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 bb2aade70a4850a195ef0c681dcfee20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum bb2aade70a4850a195ef0c681dcfee20.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2128 bb2aade70a4850a195ef0c681dcfee20.exe