Analysis

  • max time kernel
    34s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 20:50

General

  • Target

    f73a404bd789e7cd326b3b39166fbc8c90a60ce4b8b89c93f6254fe3c006bebb.exe

  • Size

    738KB

  • MD5

    30a178752b4226b8408faf824522db10

  • SHA1

    1d8050ac403a51031d1ac99228c9902bed45f4df

  • SHA256

    f73a404bd789e7cd326b3b39166fbc8c90a60ce4b8b89c93f6254fe3c006bebb

  • SHA512

    e67b50e20c5bd3004bf05e07abc9c10e64785cbfbd2bdf27aa8dc2dd59adb0bc41e572a92e135b7fcaa7077784955d5b9d3b34564e94174f127a8e7af1bbef3d

  • SSDEEP

    12288:fD4RT55fgZiJQVlLEw9PahRmzQJBDBcjF0U:74Rd5YYeVWw9KR3OjF0U

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f73a404bd789e7cd326b3b39166fbc8c90a60ce4b8b89c93f6254fe3c006bebb.exe
    "C:\Users\Admin\AppData\Local\Temp\f73a404bd789e7cd326b3b39166fbc8c90a60ce4b8b89c93f6254fe3c006bebb.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Users\Admin\AppData\Local\Temp\f73a404bd789e7cd326b3b39166fbc8c90a60ce4b8b89c93f6254fe3c006bebb.exe
      start
      2⤵
      • Checks BIOS information in registry
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Enumerates system info in registry
      PID:1744
    • C:\Users\Admin\AppData\Local\Temp\f73a404bd789e7cd326b3b39166fbc8c90a60ce4b8b89c93f6254fe3c006bebb.exe
      watch
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:1740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1740-61-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/1740-63-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/1740-66-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/1744-62-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/1744-64-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/1744-65-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/1988-54-0x0000000075281000-0x0000000075283000-memory.dmp

    Filesize

    8KB

  • memory/1988-55-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/1988-60-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB