Analysis
-
max time kernel
48s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 14:32
Static task
static1
Behavioral task
behavioral1
Sample
3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe
Resource
win10v2004-20221111-en
General
-
Target
3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe
-
Size
931KB
-
MD5
b3b6dd62e8eacd197398d61072f7ac99
-
SHA1
8bf2cf4d24dac6979ee4908cf0a62d9cfca42d7f
-
SHA256
3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86
-
SHA512
16714165d0d3dfb392338875b88e0d2ab88f775faa90b6c8f1d26ef6baa2833f3f01147f6cfc4ee1470c854779b02326368e978f6316068c2a0b9037b25c9496
-
SSDEEP
24576:i6IMwPvmB/wWq+5DUTt7FGSwmpu8nL6YK0:i6j19rut7FoU56K
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1480-55-0x0000000000400000-0x00000000004EA000-memory.dmp upx behavioral1/memory/1480-57-0x0000000000400000-0x00000000004EA000-memory.dmp upx behavioral1/memory/1480-58-0x0000000000400000-0x00000000004EA000-memory.dmp upx behavioral1/memory/1480-62-0x0000000000400000-0x00000000004EA000-memory.dmp upx behavioral1/memory/1480-63-0x0000000000400000-0x00000000004EA000-memory.dmp upx behavioral1/memory/1480-64-0x0000000000400000-0x00000000004EA000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1536 set thread context of 1480 1536 3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe 27 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1480 3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1536 wrote to memory of 1480 1536 3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe 27 PID 1536 wrote to memory of 1480 1536 3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe 27 PID 1536 wrote to memory of 1480 1536 3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe 27 PID 1536 wrote to memory of 1480 1536 3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe 27 PID 1536 wrote to memory of 1480 1536 3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe 27 PID 1536 wrote to memory of 1480 1536 3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe 27 PID 1536 wrote to memory of 1480 1536 3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe 27 PID 1536 wrote to memory of 1480 1536 3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe"C:\Users\Admin\AppData\Local\Temp\3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe"C:\Users\Admin\AppData\Local\Temp\3454fcc6c2be6192853451ba100269459bcd92b2db8a8cf8e2ab6b1ff408ca86.exe" Track="0001001000"2⤵
- Suspicious use of SetWindowsHookEx
PID:1480
-