Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18/03/2023, 10:51
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
3.0MB
-
MD5
b352cf5548ef51387d9e4a55073853ea
-
SHA1
117e972c1ffa3d7c3ddf157569d8d5155335afd4
-
SHA256
9ac5f2706cee09c809a4bbd6959021d4974aa5b677af05bd22e4c0d439ee47a8
-
SHA512
8949ae81cb32f31f0ff9543a60ae14879d53e7cbb53741dd5ba7f25c951c143149ab2dd4c1f0af13540b05ed6e8d07b1d3138588c45ee41c071459777edd4e05
-
SSDEEP
49152:lNDnB3dQQ/Fv4Nwd8G0pteuhG7NKj+g1c8aSBBNoP0lpiUT9S41NUZEnk2O:lNrFv4F3QSGMSg1Pa+X8U9Uqnk2O
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: tmp.exe File opened (read-only) \??\K: tmp.exe File opened (read-only) \??\O: tmp.exe File opened (read-only) \??\V: tmp.exe File opened (read-only) \??\B: tmp.exe File opened (read-only) \??\F: tmp.exe File opened (read-only) \??\G: tmp.exe File opened (read-only) \??\M: tmp.exe File opened (read-only) \??\T: tmp.exe File opened (read-only) \??\E: tmp.exe File opened (read-only) \??\H: tmp.exe File opened (read-only) \??\I: tmp.exe File opened (read-only) \??\N: tmp.exe File opened (read-only) \??\P: tmp.exe File opened (read-only) \??\Q: tmp.exe File opened (read-only) \??\U: tmp.exe File opened (read-only) \??\Y: tmp.exe File opened (read-only) \??\L: tmp.exe File opened (read-only) \??\R: tmp.exe File opened (read-only) \??\S: tmp.exe File opened (read-only) \??\W: tmp.exe File opened (read-only) \??\X: tmp.exe File opened (read-only) \??\Z: tmp.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 28 IoCs
pid Process 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe 1252 tmp.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz tmp.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1252 tmp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1252 tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1252