Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2023, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe
Resource
win10v2004-20220812-en
General
-
Target
145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe
-
Size
4.3MB
-
MD5
4dfd94a32be81d57f77777f51e6e16c4
-
SHA1
2d9e4cde681defe82ad0dfb55b737bab9108d5ee
-
SHA256
145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585
-
SHA512
1ec2bd6ccbc3bfe3655242f752a6a63d30810205ad34765fed218a1a9e2129d50faa9afda9beab33e4a68a17c0ce4cdf7059b499258b3e07266ebfe5aaffcce0
-
SSDEEP
98304:S2ZClVZu41GGb8G3gL53wQ0pkbIaFHCAGeLMr6:2lVA41GGb8agl4pajiTeL/
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AB0196B8-64A1-561E-F73B-39CFC1BB0FDD} 145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AB0196B8-64A1-561E-F73B-39CFC1BB0FDD}\ = "Credential Page Class" 145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AB0196B8-64A1-561E-F73B-39CFC1BB0FDD}\InProcServer32 145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AB0196B8-64A1-561E-F73B-39CFC1BB0FDD}\InProcServer32\ = "%SystemRoot%\\SysWow64\\WLanConn.dll" 145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AB0196B8-64A1-561E-F73B-39CFC1BB0FDD}\InProcServer32\ThreadingModel = "Apartment" 145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 3080 145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe Token: SeIncBasePriorityPrivilege 3080 145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe Token: 33 3080 145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe Token: SeIncBasePriorityPrivilege 3080 145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4976 wrote to memory of 3080 4976 145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe 79 PID 4976 wrote to memory of 3080 4976 145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe 79 PID 4976 wrote to memory of 3080 4976 145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe 79 PID 4976 wrote to memory of 3080 4976 145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe 79 PID 4976 wrote to memory of 3080 4976 145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe"C:\Users\Admin\AppData\Local\Temp\145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe"C:\Users\Admin\AppData\Local\Temp\145ea82013677e7e15c6dcb7f21fe66e819b6e532b4ddb8945ac42dbb3814585.exe"2⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3080
-