Analysis
-
max time kernel
186s -
max time network
193s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:26
Static task
static1
Behavioral task
behavioral1
Sample
b0b4de99111c385f09e7df106a2c713f0ab9706ce5304ae803d598c2cf703cbe.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b0b4de99111c385f09e7df106a2c713f0ab9706ce5304ae803d598c2cf703cbe.exe
Resource
win10v2004-20221111-en
General
-
Target
b0b4de99111c385f09e7df106a2c713f0ab9706ce5304ae803d598c2cf703cbe.exe
-
Size
143KB
-
MD5
42bc48144c26e0b51b0669b0713cb8e8
-
SHA1
303d7e7b29e69e3cc61538e384305c546fde7252
-
SHA256
b0b4de99111c385f09e7df106a2c713f0ab9706ce5304ae803d598c2cf703cbe
-
SHA512
c14e832f052551c4835347159474dd39b6b376f518b38b8840958e30302210c055ac1fabe5d7690119e6e9c740d0c7394cbeb82a7df888b62a102e475ba566c7
-
SSDEEP
3072:mEzQL4Nbui8yTce+zOmfHr7E+/zLT084T2Qn8bKfUH1VfPgYpC5BhI:mEzQL4NP1Tce8OeXb/3Q8UnHfUnPCvh
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
b0b4de99111c385f09e7df106a2c713f0ab9706ce5304ae803d598c2cf703cbe.exedescription ioc process File created C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Bf.exe b0b4de99111c385f09e7df106a2c713f0ab9706ce5304ae803d598c2cf703cbe.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
b0b4de99111c385f09e7df106a2c713f0ab9706ce5304ae803d598c2cf703cbe.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b0b4de99111c385f09e7df106a2c713f0ab9706ce5304ae803d598c2cf703cbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Avast·´²¡¶¾ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b0b4de99111c385f09e7df106a2c713f0ab9706ce5304ae803d598c2cf703cbe.exe" b0b4de99111c385f09e7df106a2c713f0ab9706ce5304ae803d598c2cf703cbe.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
b0b4de99111c385f09e7df106a2c713f0ab9706ce5304ae803d598c2cf703cbe.exepid process 1664 b0b4de99111c385f09e7df106a2c713f0ab9706ce5304ae803d598c2cf703cbe.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
b0b4de99111c385f09e7df106a2c713f0ab9706ce5304ae803d598c2cf703cbe.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 b0b4de99111c385f09e7df106a2c713f0ab9706ce5304ae803d598c2cf703cbe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz b0b4de99111c385f09e7df106a2c713f0ab9706ce5304ae803d598c2cf703cbe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0b4de99111c385f09e7df106a2c713f0ab9706ce5304ae803d598c2cf703cbe.exe"C:\Users\Admin\AppData\Local\Temp\b0b4de99111c385f09e7df106a2c713f0ab9706ce5304ae803d598c2cf703cbe.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
PID:1664