Analysis
-
max time kernel
127s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:05
Behavioral task
behavioral1
Sample
f0aaf004c4ac97ce8e4a5cf368af975c1c0816c8c73e30d385e2139ce35b3b9e.exe
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
General
-
Target
f0aaf004c4ac97ce8e4a5cf368af975c1c0816c8c73e30d385e2139ce35b3b9e.exe
-
Size
43KB
-
MD5
428cf20c1751393927d5d497478182f8
-
SHA1
aa55dec0fc4e4ec648de1f11579bb5bc49ccacf4
-
SHA256
f0aaf004c4ac97ce8e4a5cf368af975c1c0816c8c73e30d385e2139ce35b3b9e
-
SHA512
68a686259d96369c8cb95263fc21e47c324b39c169b8a76dfc8f623417245c3c1504e3f3fc05f66acbb14223b81109fbd3972a408124b6aa66120e6a521bb94f
-
SSDEEP
768:Aqvci/j0dGsw1m6jWDbLisavcTLSuFL1JbfuvCi8dGUQpDwgI91he8PXmBlGdy:4sjK6jWO1v8LfxYqi8cDg91hTOt
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1976-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1976-58-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Processes:
f0aaf004c4ac97ce8e4a5cf368af975c1c0816c8c73e30d385e2139ce35b3b9e.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA f0aaf004c4ac97ce8e4a5cf368af975c1c0816c8c73e30d385e2139ce35b3b9e.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
f0aaf004c4ac97ce8e4a5cf368af975c1c0816c8c73e30d385e2139ce35b3b9e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f0aaf004c4ac97ce8e4a5cf368af975c1c0816c8c73e30d385e2139ce35b3b9e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 f0aaf004c4ac97ce8e4a5cf368af975c1c0816c8c73e30d385e2139ce35b3b9e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
f0aaf004c4ac97ce8e4a5cf368af975c1c0816c8c73e30d385e2139ce35b3b9e.exepid process 1976 f0aaf004c4ac97ce8e4a5cf368af975c1c0816c8c73e30d385e2139ce35b3b9e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0aaf004c4ac97ce8e4a5cf368af975c1c0816c8c73e30d385e2139ce35b3b9e.exe"C:\Users\Admin\AppData\Local\Temp\f0aaf004c4ac97ce8e4a5cf368af975c1c0816c8c73e30d385e2139ce35b3b9e.exe"1⤵
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:1976