Analysis
-
max time kernel
150s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 09:07
Static task
static1
Behavioral task
behavioral1
Sample
e971e46da1e1545cff1224bed3661188ec4e637957608148892214488c965c08.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e971e46da1e1545cff1224bed3661188ec4e637957608148892214488c965c08.exe
Resource
win10v2004-20220901-en
General
-
Target
e971e46da1e1545cff1224bed3661188ec4e637957608148892214488c965c08.exe
-
Size
227KB
-
MD5
741b88435e00aeaabd07db3eea02241f
-
SHA1
b06bf92fc54e2725218d21b11b43d0baf708cba2
-
SHA256
e971e46da1e1545cff1224bed3661188ec4e637957608148892214488c965c08
-
SHA512
200ded88563763431e4677bb0b1807803bf99c56425bdb3fefd59acaa31be2417ffe299159ba6a6a84db2a3b9f25774facae24fe00afeb1b1e619b05597b028a
-
SSDEEP
6144:DgGdKtGiFdcPv1d2W6Jk+YGRPGSD4mnfOdxL/spE2W:USi39Jk+5RPHnOLsK2W
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e971e46da1e1545cff1224bed3661188ec4e637957608148892214488c965c08.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\2d28bfc0 = "\x19!'Ö!–Ê\x10OŒüHr\x04×ÞK“ŽºöqÔ?,\x16©·wÞà~^'6Bš!uƒ|¿Z\fÖ\\X\x04šPÛk\x19qÈÿÀ®\x1fh\u009dÜ\v™¸ã0È_(Qé¬B\x0e¢5šW\"G–úÇ\tD\x12ëá•GP|…v°ÿ~Qã=ÀÃe_Kí\x03P\u0090¸m\x05ßz;«\x03·Îø{_;COž\x05\u008dF\x02¦ók8˜»\x1aE†K®ns‚ºåc'µãßKƒ…Ú\x1d¯" e971e46da1e1545cff1224bed3661188ec4e637957608148892214488c965c08.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2028 e971e46da1e1545cff1224bed3661188ec4e637957608148892214488c965c08.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e971e46da1e1545cff1224bed3661188ec4e637957608148892214488c965c08.exe"C:\Users\Admin\AppData\Local\Temp\e971e46da1e1545cff1224bed3661188ec4e637957608148892214488c965c08.exe"1⤵
- Checks BIOS information in registry
- Modifies WinLogon
- Suspicious use of AdjustPrivilegeToken
PID:2028