Overview
overview
9Static
static
Hyper Canv...SH.nfo
windows7-x64
1Hyper Canv...SH.nfo
windows10-2004-x64
1Hyper Canv...2O.nfo
windows7-x64
1Hyper Canv...2O.nfo
windows10-2004-x64
1Hyper Canv...up.exe
windows7-x64
9Hyper Canv...up.exe
windows10-2004-x64
9Hyper Canv...id.diz
windows7-x64
3Hyper Canv...id.diz
windows10-2004-x64
3Analysis
-
max time kernel
103s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2023, 19:43
Static task
static1
Behavioral task
behavioral1
Sample
Hyper Canvas v1.53 - Edirol/BLaCK+MuSH.nfo
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Hyper Canvas v1.53 - Edirol/BLaCK+MuSH.nfo
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Hyper Canvas v1.53 - Edirol/H2O.nfo
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
Hyper Canvas v1.53 - Edirol/H2O.nfo
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
Hyper Canvas v1.53 - Edirol/Setup.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
Hyper Canvas v1.53 - Edirol/Setup.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
Hyper Canvas v1.53 - Edirol/file_id.diz
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
Hyper Canvas v1.53 - Edirol/file_id.diz
Resource
win10v2004-20220812-en
General
-
Target
Hyper Canvas v1.53 - Edirol/BLaCK+MuSH.nfo
-
Size
4KB
-
MD5
9b331987675552fb6b632f16468b8f88
-
SHA1
ffd1409cac565b321812068e54e3e78eaa68c2b8
-
SHA256
c0661fbc967722d46658cd9417167db3496a0351bc7871c2a5ffc3b74d0a8cb0
-
SHA512
f3d3051accee19fdf4c5e1a09b81d2440f552dedc2f3d8a1e269e9a4f80b4f9d7cb7b625cd0abae95243a9ab58ee36e5bb3d931935c57e91c0e79f301c51beef
-
SSDEEP
96:mZtByAMajizg5UoUMCN6TsSsKbW7SK0++adIXFbq0d:mtyA6g5OtwTixl52bb
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 msinfo32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID msinfo32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs msinfo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 msinfo32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID msinfo32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs msinfo32.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ECFirmwareMajorRelease msinfo32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ECFirmwareMinorRelease msinfo32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msinfo32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msinfo32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4760 msinfo32.exe