Analysis
-
max time kernel
156s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:44
Static task
static1
Behavioral task
behavioral1
Sample
8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe
Resource
win10v2004-20220812-en
General
-
Target
8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe
-
Size
5.3MB
-
MD5
8e77dbb8a644b5fc2f46dcdeb44d5757
-
SHA1
6ad3c1e716446a0e5216e113eeb75192af887379
-
SHA256
8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3
-
SHA512
23fd2b745bd18ac78130609ca55182dd3c2dafc3ef551c7813293a8d7bff01777f6f3acd4a166109221d24397efd2efd110eb051410e606b0200fd245ddde9af
-
SSDEEP
98304:SBBMjPL/xvPo3Dr1DOiCGy7NLr3Bt0zKaTUZ:JjPL/dg3Dr1DOipsRRWmiUZ
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4288-133-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-134-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-135-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-137-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-139-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-141-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-143-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-149-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-147-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-145-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-151-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-153-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-155-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-157-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-159-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-162-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-164-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-166-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-168-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-170-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-172-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-174-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-176-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4288-177-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
Processes:
8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exepid process 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exepid process 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe 4288 8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe"C:\Users\Admin\AppData\Local\Temp\8122f51f1f4b82f9e7bf0998d68d1ee49f80c018167b944453c7de35a8beaac3.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:4288