Analysis
-
max time kernel
102s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 04:21
Static task
static1
Behavioral task
behavioral1
Sample
a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe
Resource
win10v2004-20220812-en
General
-
Target
a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe
-
Size
4.0MB
-
MD5
ffb8f2b184a583a281e42b7ceeaacbc1
-
SHA1
848f8cb912fd833a08481f571146022fb73eb80e
-
SHA256
a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218
-
SHA512
5342fae478ccac6d933894905c5b068bd2ac0ac97dad5afb88831b31fd58bc9237388149de0439489a8913224719cb038d5c929fa098581cc7da981fd0a4a79b
-
SSDEEP
98304:Xoe0/H/vLq+crSY8bBXKJ01peq1cZqD+cngaSHQ3rafb:XhAHLq+cJ8NXKJApeq1c8DJgaBi
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{32A04561-77C1-13D1-B2E4-0060975B8649} a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{32A04561-77C1-13D1-B2E4-0060975B8649}\0 = 709c3ee7dc721bb5d28b69ee98b64d0c3f026a5b1f a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{32A04561-77C1-13D1-B2E4-0060975B8649}\Version a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{32A04561-77C1-13D1-B2E4-0060975B8649}\Version\ = "1.0" a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 680 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe Token: SeIncBasePriorityPrivilege 680 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 680 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1516 wrote to memory of 680 1516 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe 28 PID 1516 wrote to memory of 680 1516 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe 28 PID 1516 wrote to memory of 680 1516 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe 28 PID 1516 wrote to memory of 680 1516 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe 28 PID 1516 wrote to memory of 680 1516 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe 28 PID 1516 wrote to memory of 680 1516 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe 28 PID 1516 wrote to memory of 680 1516 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe 28 PID 1516 wrote to memory of 680 1516 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe"C:\Users\Admin\AppData\Local\Temp\a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe"C:\Users\Admin\AppData\Local\Temp\a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe"2⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:680
-