Analysis
-
max time kernel
100s -
max time network
104s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 08:02
Static task
static1
Behavioral task
behavioral1
Sample
c63960db6ae6813f24d492bc7c2c779683f98625bc7f7d1d76936573d4bc7eda.exe
Resource
win7-20220901-en
General
-
Target
c63960db6ae6813f24d492bc7c2c779683f98625bc7f7d1d76936573d4bc7eda.exe
-
Size
389KB
-
MD5
d5b053114d992969a30c0db35afb3b5d
-
SHA1
470f2e15c0a2f000d5651b94e88ff01c835788bd
-
SHA256
c63960db6ae6813f24d492bc7c2c779683f98625bc7f7d1d76936573d4bc7eda
-
SHA512
0c643ac7342b1c6213a1d0fb756e52706d2738cf338fef5e9abacf176cc464a6a6977f7eabfd846857a98cbf29e9f41672c1d4458ad420472406fee28748d8c9
-
SSDEEP
6144:JgSXZ/Sr/59PRfdrnZZig11lgEvAJh91dQcBoWXraMoK/YE5mmPxsRTYQB0Z2s7T:JgKkhdRNnbdBAR8cocov8mmPxxYoL7
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c63960db6ae6813f24d492bc7c2c779683f98625bc7f7d1d76936573d4bc7eda.exe -
Deletes itself 1 IoCs
pid Process 744 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c63960db6ae6813f24d492bc7c2c779683f98625bc7f7d1d76936573d4bc7eda.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1300 c63960db6ae6813f24d492bc7c2c779683f98625bc7f7d1d76936573d4bc7eda.exe 1300 c63960db6ae6813f24d492bc7c2c779683f98625bc7f7d1d76936573d4bc7eda.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1300 c63960db6ae6813f24d492bc7c2c779683f98625bc7f7d1d76936573d4bc7eda.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1300 wrote to memory of 744 1300 c63960db6ae6813f24d492bc7c2c779683f98625bc7f7d1d76936573d4bc7eda.exe 29 PID 1300 wrote to memory of 744 1300 c63960db6ae6813f24d492bc7c2c779683f98625bc7f7d1d76936573d4bc7eda.exe 29 PID 1300 wrote to memory of 744 1300 c63960db6ae6813f24d492bc7c2c779683f98625bc7f7d1d76936573d4bc7eda.exe 29 PID 1300 wrote to memory of 744 1300 c63960db6ae6813f24d492bc7c2c779683f98625bc7f7d1d76936573d4bc7eda.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c63960db6ae6813f24d492bc7c2c779683f98625bc7f7d1d76936573d4bc7eda.exe"C:\Users\Admin\AppData\Local\Temp\c63960db6ae6813f24d492bc7c2c779683f98625bc7f7d1d76936573d4bc7eda.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\cmd.exe/c C:\Users\Admin\AppData\Local\Temp\~unins7593.bat "C:\Users\Admin\AppData\Local\Temp\c63960db6ae6813f24d492bc7c2c779683f98625bc7f7d1d76936573d4bc7eda.exe"2⤵
- Deletes itself
PID:744
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49B
MD59e0a2f5ab30517809b95a1ff1dd98c53
SHA15c1eefdf10e67d1e9216e2e3f5e92352d583c9ce
SHA25697ac9fee75a1f7b63b3115e9c4fb9dda80b1caba26d2fb51325670dee261fe32
SHA512e959cc1fd48fb1cccf135a697924c775a3812bab211fc7f9b00c5a9d617261d84c5d6f7cb548774c1e8f46811b06ca39c5603d0e10cbcb7b805f9abbe49b9b42