Analysis
-
max time kernel
9s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 11:38
Static task
static1
Behavioral task
behavioral1
Sample
3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe
Resource
win10v2004-20220812-en
General
-
Target
3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe
-
Size
428KB
-
MD5
8d0ed51425b8b2572fa544279dfc011c
-
SHA1
85a2bb9f5ddbc00550de40a001c2f2e239ed484e
-
SHA256
3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d
-
SHA512
a7b35405996c4b4eccf96b10b674e979150d86db30fee19acb0e38c53ea2fac02291179ff5ae0ae9fb3475db8c8fa5b0acc164c60f3959d29b4d3b7aebc2f633
-
SSDEEP
6144:spjBmZ55Ue2KH7r5yN9JNcWxvRlGsB5HI:IjBgsPKH7r5i9Lx2u
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8DABDC0D-AFBE-53A2-6AA9-48B8D33ABEFF}\InprocServer32 3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8DABDC0D-AFBE-53A2-6AA9-48B8D33ABEFF}\InprocServer32\ = "C:\\Windows\\SysWOW64\\gameux.dll" 3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8DABDC0D-AFBE-53A2-6AA9-48B8D33ABEFF}\InprocServer32\ThreadingModel = "Both" 3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8DABDC0D-AFBE-53A2-6AA9-48B8D33ABEFF} 3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8DABDC0D-AFBE-53A2-6AA9-48B8D33ABEFF}\ = "GameCleanupHandler Class" 3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1740 3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe Token: SeIncBasePriorityPrivilege 1740 3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe Token: 33 1740 3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe Token: SeIncBasePriorityPrivilege 1740 3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1740 3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1296 wrote to memory of 1740 1296 3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe 27 PID 1296 wrote to memory of 1740 1296 3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe 27 PID 1296 wrote to memory of 1740 1296 3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe 27 PID 1296 wrote to memory of 1740 1296 3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe 27 PID 1296 wrote to memory of 1740 1296 3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe 27 PID 1296 wrote to memory of 1740 1296 3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe 27 PID 1296 wrote to memory of 1740 1296 3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe 27 PID 1296 wrote to memory of 1740 1296 3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe"C:\Users\Admin\AppData\Local\Temp\3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe"C:\Users\Admin\AppData\Local\Temp\3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe"2⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1740
-