Analysis

  • max time kernel
    42s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 03:30

General

  • Target

    5ea4ea7f53f0a78cac22e14d34f09210f02c47459a8d6c706a2e1ee9f4576ed0.exe

  • Size

    709KB

  • MD5

    e575eb9ee66c7c2c2071cdf4879b14bc

  • SHA1

    96b9ccace682b268444c945cd9b94c79ac47ba85

  • SHA256

    5ea4ea7f53f0a78cac22e14d34f09210f02c47459a8d6c706a2e1ee9f4576ed0

  • SHA512

    fbbbb7477ecd3878d02ad57f6b4e777960bac65620e52f15c7b5c8fe06cc2b70dd79fba5804f9c0bbe1d6f8d02927f3766c7d6866782714df0678302fc936d6f

  • SSDEEP

    12288:UigqIkHyLkIOeee+fAZwfqDPdM+UULoGTxOk82HmVJZP0a:Uik6yIVeSAZwCCDGTxOB2HEoa

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ea4ea7f53f0a78cac22e14d34f09210f02c47459a8d6c706a2e1ee9f4576ed0.exe
    "C:\Users\Admin\AppData\Local\Temp\5ea4ea7f53f0a78cac22e14d34f09210f02c47459a8d6c706a2e1ee9f4576ed0.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Users\Admin\AppData\Local\Temp\5ea4ea7f53f0a78cac22e14d34f09210f02c47459a8d6c706a2e1ee9f4576ed0.exe
      "C:\Users\Admin\AppData\Local\Temp\5ea4ea7f53f0a78cac22e14d34f09210f02c47459a8d6c706a2e1ee9f4576ed0.exe" Track="0001001000"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1696

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1696-54-0x0000000000400000-0x00000000004F8000-memory.dmp

    Filesize

    992KB

  • memory/1696-55-0x0000000000400000-0x00000000004F8000-memory.dmp

    Filesize

    992KB

  • memory/1696-57-0x0000000000400000-0x00000000004F8000-memory.dmp

    Filesize

    992KB

  • memory/1696-59-0x0000000000400000-0x00000000004F8000-memory.dmp

    Filesize

    992KB

  • memory/1696-61-0x0000000000400000-0x00000000004F8000-memory.dmp

    Filesize

    992KB

  • memory/1696-63-0x0000000000400000-0x00000000004F8000-memory.dmp

    Filesize

    992KB

  • memory/1696-65-0x0000000000400000-0x00000000004F8000-memory.dmp

    Filesize

    992KB

  • memory/1696-68-0x0000000075111000-0x0000000075113000-memory.dmp

    Filesize

    8KB

  • memory/1696-69-0x0000000000400000-0x00000000004F8000-memory.dmp

    Filesize

    992KB

  • memory/1696-70-0x0000000000400000-0x00000000004F8000-memory.dmp

    Filesize

    992KB

  • memory/1696-71-0x0000000000400000-0x00000000004F8000-memory.dmp

    Filesize

    992KB