Analysis

  • max time kernel
    9s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 11:38

General

  • Target

    3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe

  • Size

    428KB

  • MD5

    8d0ed51425b8b2572fa544279dfc011c

  • SHA1

    85a2bb9f5ddbc00550de40a001c2f2e239ed484e

  • SHA256

    3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d

  • SHA512

    a7b35405996c4b4eccf96b10b674e979150d86db30fee19acb0e38c53ea2fac02291179ff5ae0ae9fb3475db8c8fa5b0acc164c60f3959d29b4d3b7aebc2f633

  • SSDEEP

    6144:spjBmZ55Ue2KH7r5yN9JNcWxvRlGsB5HI:IjBgsPKH7r5i9Lx2u

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Modifies registry class 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe
    "C:\Users\Admin\AppData\Local\Temp\3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1296
    • C:\Users\Admin\AppData\Local\Temp\3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe
      "C:\Users\Admin\AppData\Local\Temp\3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe"
      2⤵
      • Checks BIOS information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1296-61-0x0000000000400000-0x00000000004A3000-memory.dmp

    Filesize

    652KB

  • memory/1296-62-0x0000000000330000-0x00000000003D3000-memory.dmp

    Filesize

    652KB

  • memory/1296-68-0x0000000000400000-0x00000000004A3000-memory.dmp

    Filesize

    652KB

  • memory/1740-54-0x0000000000000000-mapping.dmp

  • memory/1740-55-0x00000000759C1000-0x00000000759C3000-memory.dmp

    Filesize

    8KB

  • memory/1740-56-0x00000000003A0000-0x00000000003E2000-memory.dmp

    Filesize

    264KB

  • memory/1740-63-0x0000000000400000-0x00000000004A3000-memory.dmp

    Filesize

    652KB

  • memory/1740-64-0x00000000003A1000-0x00000000003CB000-memory.dmp

    Filesize

    168KB

  • memory/1740-65-0x0000000000404000-0x0000000000405000-memory.dmp

    Filesize

    4KB

  • memory/1740-66-0x0000000000405000-0x0000000000406000-memory.dmp

    Filesize

    4KB

  • memory/1740-67-0x0000000000400000-0x00000000004A3000-memory.dmp

    Filesize

    652KB

  • memory/1740-69-0x00000000003A1000-0x00000000003CB000-memory.dmp

    Filesize

    168KB