Analysis
-
max time kernel
148s -
max time network
185s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 07:12
Behavioral task
behavioral1
Sample
bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe
Resource
win10v2004-20221111-en
General
-
Target
bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe
-
Size
362KB
-
MD5
5eb62ff48048584ae1a29d6a4698ccae
-
SHA1
a78bb9335164d216ab7bcdce5a7d9040d323c598
-
SHA256
bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e
-
SHA512
c1e0f9624b3485e68478c44e1dec888c7d9980c76a0676bbc47b56c200725417ad0c4a58a0da1b9db5529d9cc165807ec323955dea0090ffb76dea0873393579
-
SSDEEP
6144:C3rcIG98IZou0XYDd0mfFhTESz5kTM2pnOhwXHrhBBon6hP6d998o8tl/6e:y/uEYDNfPBzI7OhK9o6hP6d9F8r/
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1260-54-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/1260-57-0x0000000000320000-0x00000000003BD000-memory.dmp upx behavioral1/memory/1260-60-0x0000000000320000-0x00000000003BD000-memory.dmp upx behavioral1/memory/1260-62-0x0000000000320000-0x00000000003BD000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1260 bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe 1260 bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe 1260 bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe 1260 bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe 1260 bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe 1260 bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1260 bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe Token: SeDebugPrivilege 1260 bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe Token: SeImpersonatePrivilege 1260 bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe Token: SeDebugPrivilege 1260 bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe Token: SeImpersonatePrivilege 1260 bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe Token: SeDebugPrivilege 1260 bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe Token: SeImpersonatePrivilege 1260 bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe Token: SeDebugPrivilege 1260 bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe Token: SeImpersonatePrivilege 1260 bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe"C:\Users\Admin\AppData\Local\Temp\bebee881d6161401027222dc4b2557ab1187a74a8fe5c906b134beda59cb0c2e.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1260