Analysis

  • max time kernel
    82s
  • max time network
    195s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    20-10-2021 15:32

General

  • Target

    03ff897da4bfb8bc549fdb1ebf7ee940bcb9b57fed7d26d83c45d1e9ec1f40b3.exe

  • Size

    7.0MB

  • MD5

    4374755e7ce0c9c64bc1425ae7167bbc

  • SHA1

    e2a2fff655b93f687b9f28a52913ebe616a7ba54

  • SHA256

    03ff897da4bfb8bc549fdb1ebf7ee940bcb9b57fed7d26d83c45d1e9ec1f40b3

  • SHA512

    873bf797f5b3bad34a3243b3dc15937832a0b3004da647e1a8020e47437609ab0791664158d7a9489f2cf6cf91daff59717f9160aa02eec27d41957fd91c6e23

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Modifies registry class 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03ff897da4bfb8bc549fdb1ebf7ee940bcb9b57fed7d26d83c45d1e9ec1f40b3.exe
    "C:\Users\Admin\AppData\Local\Temp\03ff897da4bfb8bc549fdb1ebf7ee940bcb9b57fed7d26d83c45d1e9ec1f40b3.exe"
    1⤵
    • Checks BIOS information in registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:3476

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3476-118-0x00000000033F0000-0x00000000034E9000-memory.dmp
    Filesize

    996KB

  • memory/3476-122-0x0000000000400000-0x0000000001762000-memory.dmp
    Filesize

    19.4MB

  • memory/3476-123-0x0000000000400000-0x0000000001762000-memory.dmp
    Filesize

    19.4MB

  • memory/3476-124-0x0000000000400000-0x0000000001762000-memory.dmp
    Filesize

    19.4MB

  • memory/3476-125-0x0000000001810000-0x0000000001820000-memory.dmp
    Filesize

    64KB

  • memory/3476-126-0x0000000003240000-0x0000000003241000-memory.dmp
    Filesize

    4KB