Analysis
-
max time kernel
51s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 16:08
Static task
static1
Behavioral task
behavioral1
Sample
51a6ba3c622594bf175e0d5c443760fde088439671d4adde27beae6345a7f010.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
51a6ba3c622594bf175e0d5c443760fde088439671d4adde27beae6345a7f010.exe
Resource
win10v2004-20221111-en
General
-
Target
51a6ba3c622594bf175e0d5c443760fde088439671d4adde27beae6345a7f010.exe
-
Size
549KB
-
MD5
26f3795939222018a28e1b608d877050
-
SHA1
05b5201150fc7fd14a0da8e2fc5bd044d5253cfd
-
SHA256
51a6ba3c622594bf175e0d5c443760fde088439671d4adde27beae6345a7f010
-
SHA512
b639f271ae18c241fd97a5ae304aad9947cc4a420878062d449e28782594e30a4194cf6a116ee766fc444bd884c7ab93132aa6be55b29218d0d11f7ed78a4c9d
-
SSDEEP
12288:Lu/0orFvVXAMwo6ooGamQR9qL66WvoMzlTTXb/dp:LLob87LmW9q26YbTX7j
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Set value (int) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion = "0" 51a6ba3c622594bf175e0d5c443760fde088439671d4adde27beae6345a7f010.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 51a6ba3c622594bf175e0d5c443760fde088439671d4adde27beae6345a7f010.exe Set value (int) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier = "0" 51a6ba3c622594bf175e0d5c443760fde088439671d4adde27beae6345a7f010.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1448 51a6ba3c622594bf175e0d5c443760fde088439671d4adde27beae6345a7f010.exe 1448 51a6ba3c622594bf175e0d5c443760fde088439671d4adde27beae6345a7f010.exe 1448 51a6ba3c622594bf175e0d5c443760fde088439671d4adde27beae6345a7f010.exe 1448 51a6ba3c622594bf175e0d5c443760fde088439671d4adde27beae6345a7f010.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\51a6ba3c622594bf175e0d5c443760fde088439671d4adde27beae6345a7f010.exe"C:\Users\Admin\AppData\Local\Temp\51a6ba3c622594bf175e0d5c443760fde088439671d4adde27beae6345a7f010.exe"1⤵
- Checks BIOS information in registry
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:1448