Analysis
-
max time kernel
189s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 14:02
Static task
static1
Behavioral task
behavioral1
Sample
4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe
Resource
win10v2004-20221111-en
General
-
Target
4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe
-
Size
1.0MB
-
MD5
398d987eb4d14f74f15a29ab601b0943
-
SHA1
3997e9be34ae86e9e81e89814caae8d2c6390b3a
-
SHA256
4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8
-
SHA512
13949e8a91e7c23822d8c6dc7897b36ecb9cf91b0486a697e4c54e8aac11b0a22e9f55c433f6e6e392f718863b8184f7f9ef2c9ea61019012e0c650b2a82a462
-
SSDEEP
24576:w0BfZ15Scs4mUj79qPiqn7yauT/asgd0tp8A:w0guUuT/asgU
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2416 set thread context of 224 2416 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe 83 -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 224 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe 224 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe 224 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe 224 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe 224 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe 224 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2416 wrote to memory of 224 2416 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe 83 PID 2416 wrote to memory of 224 2416 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe 83 PID 2416 wrote to memory of 224 2416 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe 83 PID 2416 wrote to memory of 224 2416 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe 83 PID 2416 wrote to memory of 224 2416 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe 83 PID 2416 wrote to memory of 224 2416 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe 83 PID 2416 wrote to memory of 224 2416 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe 83 PID 2416 wrote to memory of 224 2416 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe 83 PID 2416 wrote to memory of 224 2416 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe 83 PID 2416 wrote to memory of 224 2416 4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe"C:\Users\Admin\AppData\Local\Temp\4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe"C:\Users\Admin\AppData\Local\Temp\4b600c306ad0bba405f0914a5b0cc64412c7659217a934ade34bf5d5aa45fac8.exe" Track="0001001000"2⤵
- Suspicious use of SetWindowsHookEx
PID:224
-