Analysis
-
max time kernel
155s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe
Resource
win10v2004-20220812-en
General
-
Target
fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe
-
Size
1.9MB
-
MD5
61afd28dd09cc9085a731348dab158dc
-
SHA1
4635ddfb846acd25c03d787f915e855bae2a6d6f
-
SHA256
fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e
-
SHA512
0fe4be0559da875db68128526ec93eb7f3fdcf4b90c0920d267a5024e696d61dadf4cfe925715507e384403747fb73aae14b119549a9c59b9dca050f45777664
-
SSDEEP
49152:hk7BgTU0ndXwExQ9jydRNxxgpiZ+JMt4MHzp2iBM:hk7n0Nd3xxgpmtLzp2iS
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe -
Modifies registry class 27 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\ToolboxBitmap32 fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\Control fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\MiscStatus fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\MiscStatus\1\ = "132499" fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\Programmable fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\TypeLib\ = "{0E59F1D2-1FBE-11D0-8FF2-00A0D10038BC}" fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\ = "ScriptControl Object" fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\InprocServer32 fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\ToolboxBitmap32\ = "\"C:\\Windows\\SysWOW64\\msscript.ocx\",102" fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\VersionIndependentProgID\ = "MSScriptControl.ScriptControl" fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\Version fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\Version\ = "1.0" fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\VersionIndependentProgID fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\MiscStatus\ = "0" fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC} fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\InprocServer32\ThreadingModel = "Apartment" fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\MiscStatus\1 fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\Implemented Categories fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\InprocServer32\ = "C:\\Windows\\SysWOW64\\msscript.ocx" fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\ProgID fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\ProgID\ = "MSScriptControl.ScriptControl.1" fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5A46099-E687-FEB1-9578-1BBA90CF9EFC}\TypeLib fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2204 fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe Token: SeIncBasePriorityPrivilege 2204 fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2204 fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe"C:\Users\Admin\AppData\Local\Temp\fdfcb748379756823b80a53a214ce60a49531c82076dd53db123e0ccba35423e.exe"1⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2204