Analysis
-
max time kernel
132s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 14:30
Static task
static1
Behavioral task
behavioral1
Sample
40c331e661c2d5079af5aaf6c4d706f5bbb3eee077853291235f0a470c94fbfb.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
40c331e661c2d5079af5aaf6c4d706f5bbb3eee077853291235f0a470c94fbfb.exe
Resource
win10v2004-20220414-en
General
-
Target
40c331e661c2d5079af5aaf6c4d706f5bbb3eee077853291235f0a470c94fbfb.exe
-
Size
236KB
-
MD5
1b4bb57ddc3b95528194fabaf01ac054
-
SHA1
d43099bcf31d5a9e9fb0cec6b624ed7c722486a4
-
SHA256
40c331e661c2d5079af5aaf6c4d706f5bbb3eee077853291235f0a470c94fbfb
-
SHA512
17fd778588b264fee527a05ad994293871783c02e6b2d34197b45697d5e02dc9655b475ade8debeed6430833844a20f9c48eb0f1a397a099d027b56b9ea082e2
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
40c331e661c2d5079af5aaf6c4d706f5bbb3eee077853291235f0a470c94fbfb.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 40c331e661c2d5079af5aaf6c4d706f5bbb3eee077853291235f0a470c94fbfb.exe