General
-
Target
spf.exe
-
Size
74.3MB
-
Sample
241211-at1ata1pdm
-
MD5
080f818c1eee78a599b8402962ee5593
-
SHA1
e929908842d65b784a2b98041fd563447e085c94
-
SHA256
370abddcc90e3fe150dc4e57dcfc237a906cd328d209c9657fdd2db662285e28
-
SHA512
f6e2acdc25824381e4108ce5cf30360020f16f2d2810bc9d47bc83e02d80b090e0f5b1d3f5f0fbbf318bccf0850e967e98a1755b5a467b44c97d4bdbe7a8cc0a
-
SSDEEP
1572864:UCF/QoAcEwBtXTjLnyn7PmhM2QbnzdLaXqVa:s/uD/Ia0JLat
Static task
static1
Behavioral task
behavioral1
Sample
spf.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
spf.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
spf.exe
-
Size
74.3MB
-
MD5
080f818c1eee78a599b8402962ee5593
-
SHA1
e929908842d65b784a2b98041fd563447e085c94
-
SHA256
370abddcc90e3fe150dc4e57dcfc237a906cd328d209c9657fdd2db662285e28
-
SHA512
f6e2acdc25824381e4108ce5cf30360020f16f2d2810bc9d47bc83e02d80b090e0f5b1d3f5f0fbbf318bccf0850e967e98a1755b5a467b44c97d4bdbe7a8cc0a
-
SSDEEP
1572864:UCF/QoAcEwBtXTjLnyn7PmhM2QbnzdLaXqVa:s/uD/Ia0JLat
Score10/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-