Analysis
-
max time kernel
52s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 09:32
Static task
static1
Behavioral task
behavioral1
Sample
a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe
Resource
win10v2004-20221111-en
General
-
Target
a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe
-
Size
935KB
-
MD5
2e023cb7c218c7ca8a464f81ee18a20f
-
SHA1
32628916286d503e98d3a745720f4634ebf8959f
-
SHA256
a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d
-
SHA512
07659409e239ec41bdb7e6bd57d1c404ad3a9fc0961c6d3788cef20d9dc7e2ce9238c327ee2da6c2bf47934ce7c913e0231a9781242538acc76c17cc23903a4d
-
SSDEEP
12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4a:pyHv5Z+Wzv7AiBll0OBWi6si9GT
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/556-55-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/556-58-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/556-57-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/556-62-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/556-63-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/556-64-0x0000000000400000-0x00000000004F2000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2020 set thread context of 556 2020 a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe 29 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 556 a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2020 wrote to memory of 556 2020 a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe 29 PID 2020 wrote to memory of 556 2020 a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe 29 PID 2020 wrote to memory of 556 2020 a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe 29 PID 2020 wrote to memory of 556 2020 a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe 29 PID 2020 wrote to memory of 556 2020 a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe 29 PID 2020 wrote to memory of 556 2020 a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe 29 PID 2020 wrote to memory of 556 2020 a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe 29 PID 2020 wrote to memory of 556 2020 a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe"C:\Users\Admin\AppData\Local\Temp\a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe"C:\Users\Admin\AppData\Local\Temp\a95640ead48e9f6b3315132d77fe7e4d89ee012daf2038843bc5b946ad41ed3d.exe" Track="0001001000"2⤵
- Suspicious use of SetWindowsHookEx
PID:556
-