Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 08:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
debc4355c93e577e12194624ff98a312.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
debc4355c93e577e12194624ff98a312.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
debc4355c93e577e12194624ff98a312.exe
-
Size
94KB
-
MD5
debc4355c93e577e12194624ff98a312
-
SHA1
69e78fe15ae900cd229271d43c88e458a311f027
-
SHA256
12d98be1578d27c27804c6080935ebe51c6dc7b89a3a1adcf6f0df09b8fa4cf8
-
SHA512
04595ee3c6c4a334832ac4b9c8de4d4b45125ddce81976d4cda2361bd2d2ebaabddbc99cab8b7048aeac5eeae661d65f1d83be557bcacc850c919e28b1f220e7
-
SSDEEP
768:a1WSi/dsglP+iW0S2uGAIVIsuwMpyvisdGmGHwWcJWHwfGlDgJjhOXs:U2thzWwtVI+Sg5D
Score
6/10
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum debc4355c93e577e12194624ff98a312.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 debc4355c93e577e12194624ff98a312.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2164 debc4355c93e577e12194624ff98a312.exe 2164 debc4355c93e577e12194624ff98a312.exe 2164 debc4355c93e577e12194624ff98a312.exe