Analysis
-
max time kernel
133s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
ba50a3b643514b05ad3a92ac578a74720c5decf258ed27bb008d58c32bcf2017.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ba50a3b643514b05ad3a92ac578a74720c5decf258ed27bb008d58c32bcf2017.exe
Resource
win10v2004-20220812-en
General
-
Target
ba50a3b643514b05ad3a92ac578a74720c5decf258ed27bb008d58c32bcf2017.exe
-
Size
137KB
-
MD5
25aa86b5afc795cf63082b083b7d5b91
-
SHA1
e0b9ef9e95a60a0a956a8b1669b2fa36358aab5c
-
SHA256
ba50a3b643514b05ad3a92ac578a74720c5decf258ed27bb008d58c32bcf2017
-
SHA512
e51f4fb100756c8d5442a996831b4b5fa66f6a7367f4407e3fbd78125bcf0afc360bead694fa1dc81fb255ccedbf58764680f82b29e54e2a786b081b714005d2
-
SSDEEP
3072:KZDMrWlf/FafXXvxJ8t6q/dd33Ecy8EEKOuclJdsyCgnz0Pjqzj/FX93J:SI6Z/FcXXM6q/v30cy8EEKOuclJd/CgJ
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{C07C8E4B-2BE7-4010-999B-B3636DE510F4}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{8C7B7563-8A33-49CC-8A8C-5BE89954061C}.catalogItem svchost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1544 ba50a3b643514b05ad3a92ac578a74720c5decf258ed27bb008d58c32bcf2017.exe 1544 ba50a3b643514b05ad3a92ac578a74720c5decf258ed27bb008d58c32bcf2017.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba50a3b643514b05ad3a92ac578a74720c5decf258ed27bb008d58c32bcf2017.exe"C:\Users\Admin\AppData\Local\Temp\ba50a3b643514b05ad3a92ac578a74720c5decf258ed27bb008d58c32bcf2017.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:1544
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:384