Analysis
-
max time kernel
23s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 07:49
Behavioral task
behavioral1
Sample
bcb296a614ef4ca7e3220b6ee6c57dc5bec33fb220c741c8f7fa31cc97f3ef4e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bcb296a614ef4ca7e3220b6ee6c57dc5bec33fb220c741c8f7fa31cc97f3ef4e.exe
Resource
win10v2004-20220812-en
General
-
Target
bcb296a614ef4ca7e3220b6ee6c57dc5bec33fb220c741c8f7fa31cc97f3ef4e.exe
-
Size
20KB
-
MD5
4ad96c1c4dd72810772520368b2c4fa8
-
SHA1
6ec60a6686640ba089dee34368a5c3edeff19d93
-
SHA256
bcb296a614ef4ca7e3220b6ee6c57dc5bec33fb220c741c8f7fa31cc97f3ef4e
-
SHA512
dce5148eb4dca72755f4115a3bd5aee9bc0f4621cf5f36a21b2b736de4d299f69eea440d9feb99b4df63ce80f0ef7b477e23bf60c73531890dd03447c184f8d9
-
SSDEEP
384:d6hhOSpB5p/Ds6HEBJH79NeKPi+PvYqiLHrroGszJlU/sr7:d6/O8BD/Ia65TPi+ZCHsYkr7
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2028-56-0x0000000000400000-0x0000000000411000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum bcb296a614ef4ca7e3220b6ee6c57dc5bec33fb220c741c8f7fa31cc97f3ef4e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 bcb296a614ef4ca7e3220b6ee6c57dc5bec33fb220c741c8f7fa31cc97f3ef4e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2028 bcb296a614ef4ca7e3220b6ee6c57dc5bec33fb220c741c8f7fa31cc97f3ef4e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcb296a614ef4ca7e3220b6ee6c57dc5bec33fb220c741c8f7fa31cc97f3ef4e.exe"C:\Users\Admin\AppData\Local\Temp\bcb296a614ef4ca7e3220b6ee6c57dc5bec33fb220c741c8f7fa31cc97f3ef4e.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:2028