Analysis

  • max time kernel
    83s
  • max time network
    199s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 04:56

General

  • Target

    一键修改系统信息.exe

  • Size

    1.7MB

  • MD5

    0692e1b606617ee36a5bff5a919bac66

  • SHA1

    aa29d6e9049c125084c8b78c6f816a5ffaed0bee

  • SHA256

    a114ea8d11c12e66d1fb2ddd31ce91aa24ec9355dc6b3ab3fe2840cdf6a3f96b

  • SHA512

    b45a6438d7bc3039520bcc3abd97530fd776036e1b5756117fc3dfaa980bc7633adaea0b61c173e3a066083f7d4522a89d782c14a56eb5349920b68407773deb

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 36 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks system information in the registry 2 TTPs 18 IoCs

    System information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\一键修改系统信息.exe
    "C:\Users\Admin\AppData\Local\Temp\一键修改系统信息.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks system information in the registry
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:892
  • C:\Users\Admin\AppData\Local\Temp\一键修改系统信息.exe
    "C:\Users\Admin\AppData\Local\Temp\一键修改系统信息.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks system information in the registry
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:892
  • C:\Users\Admin\AppData\Local\Temp\一键修改系统信息.exe
    "C:\Users\Admin\AppData\Local\Temp\一键修改系统信息.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks system information in the registry
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:892
  • C:\Users\Admin\AppData\Local\Temp\一键修改系统信息.exe
    "C:\Users\Admin\AppData\Local\Temp\一键修改系统信息.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks system information in the registry
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:892
  • C:\Users\Admin\AppData\Local\Temp\一键修改系统信息.exe
    "C:\Users\Admin\AppData\Local\Temp\一键修改系统信息.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks system information in the registry
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:892
  • C:\Users\Admin\AppData\Local\Temp\一键修改系统信息.exe
    "C:\Users\Admin\AppData\Local\Temp\一键修改系统信息.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks system information in the registry
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:892
  • C:\Users\Admin\AppData\Local\Temp\一键修改系统信息.exe
    "C:\Users\Admin\AppData\Local\Temp\一键修改系统信息.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks system information in the registry
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:892
  • C:\Users\Admin\AppData\Local\Temp\一键修改系统信息.exe
    "C:\Users\Admin\AppData\Local\Temp\一键修改系统信息.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks system information in the registry
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:892
  • C:\Users\Admin\AppData\Local\Temp\一键修改系统信息.exe
    "C:\Users\Admin\AppData\Local\Temp\一键修改系统信息.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks system information in the registry
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:892

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/892-54-0x0000000076191000-0x0000000076193000-memory.dmp
    Filesize

    8KB

  • memory/892-54-0x0000000076191000-0x0000000076193000-memory.dmp
    Filesize

    8KB

  • memory/892-54-0x0000000076191000-0x0000000076193000-memory.dmp
    Filesize

    8KB

  • memory/892-54-0x0000000076191000-0x0000000076193000-memory.dmp
    Filesize

    8KB

  • memory/892-54-0x0000000076191000-0x0000000076193000-memory.dmp
    Filesize

    8KB

  • memory/892-54-0x0000000076191000-0x0000000076193000-memory.dmp
    Filesize

    8KB

  • memory/892-54-0x0000000076191000-0x0000000076193000-memory.dmp
    Filesize

    8KB

  • memory/892-54-0x0000000076191000-0x0000000076193000-memory.dmp
    Filesize

    8KB

  • memory/892-54-0x0000000076191000-0x0000000076193000-memory.dmp
    Filesize

    8KB