Analysis
-
max time kernel
45s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
4c61ceecceb38c27d2dcba4775ec272ffde59118213f4c91e38272e141a87882.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4c61ceecceb38c27d2dcba4775ec272ffde59118213f4c91e38272e141a87882.exe
Resource
win10v2004-20220812-en
General
-
Target
4c61ceecceb38c27d2dcba4775ec272ffde59118213f4c91e38272e141a87882.exe
-
Size
827KB
-
MD5
36621e5ced5f71f3cd81c1a37abc4130
-
SHA1
c4098e443a8b3e39eeb9c4a9ffa2eadb4535e915
-
SHA256
4c61ceecceb38c27d2dcba4775ec272ffde59118213f4c91e38272e141a87882
-
SHA512
da9edd3cf524c51b1a9fda0656f4b1adfa5f1e14827e55f1b0acb0cdf08e94f35e104b0eb9f6ae51d96cd2d8cf7af9830f831c3454132cdcda37ce4e5376f671
-
SSDEEP
24576:UXjUmHX92n1VydDmFkKxKW0eeZd3M5fCX8rOlVePRfbpJr:cIP1GKbxKveeXMQMrnR7
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4c61ceecceb38c27d2dcba4775ec272ffde59118213f4c91e38272e141a87882.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1996 4c61ceecceb38c27d2dcba4775ec272ffde59118213f4c91e38272e141a87882.exe 1996 4c61ceecceb38c27d2dcba4775ec272ffde59118213f4c91e38272e141a87882.exe 1996 4c61ceecceb38c27d2dcba4775ec272ffde59118213f4c91e38272e141a87882.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c61ceecceb38c27d2dcba4775ec272ffde59118213f4c91e38272e141a87882.exe"C:\Users\Admin\AppData\Local\Temp\4c61ceecceb38c27d2dcba4775ec272ffde59118213f4c91e38272e141a87882.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1996