Analysis
-
max time kernel
134s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 08:04
Static task
static1
Behavioral task
behavioral1
Sample
930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe
Resource
win10v2004-20220812-en
General
-
Target
930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe
-
Size
1.1MB
-
MD5
520f20dd916c8ace517c8a041c74ade1
-
SHA1
4c2872f2952a2425966962e7181e9c4654e794a7
-
SHA256
930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302
-
SHA512
91d25fe254e017b100edd95672841345963b5cb2acb8aaff198b7f8cca21dbd74db964faf91b63d7c0ca75b15f76ec26b82a432b94b47858d306e4e08d9714f7
-
SSDEEP
12288:Bxm03dDATu3TtKUhG3QQkrEcdvMqH1dznOotRldDfHbg5+MH/QTK7ufrncquNGsb:BgS73RKUsaVdzOotdDfStfsKafIgsb
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exedescription pid process target process PID 2548 set thread context of 4960 2548 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exepid process 4960 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe 4960 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe 4960 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe 4960 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe 4960 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe 4960 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exedescription pid process target process PID 2548 wrote to memory of 4960 2548 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe PID 2548 wrote to memory of 4960 2548 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe PID 2548 wrote to memory of 4960 2548 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe PID 2548 wrote to memory of 4960 2548 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe PID 2548 wrote to memory of 4960 2548 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe PID 2548 wrote to memory of 4960 2548 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe PID 2548 wrote to memory of 4960 2548 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe PID 2548 wrote to memory of 4960 2548 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe PID 2548 wrote to memory of 4960 2548 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe PID 2548 wrote to memory of 4960 2548 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe 930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe"C:\Users\Admin\AppData\Local\Temp\930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe"C:\Users\Admin\AppData\Local\Temp\930bddb7bcaf90e45105455043e9de2920c823002a047e1d374a2bc490f49302.exe" Track="0001001000"2⤵
- Suspicious use of SetWindowsHookEx
PID:4960
-