Analysis
-
max time kernel
163s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2023 11:04
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
3.0MB
-
MD5
575f0a5d9e2f34752d16004724e490b7
-
SHA1
48af1d5f46ffddbceb2c626bcd0417840a2ca8d4
-
SHA256
93e25d10a02c8c0c68d23c7887aa83cfd4de428f52583787f9f829cc22f08159
-
SHA512
19771087ed80e8b613ea647457a7d4186748aad28a587e654250b2479c658633f56f417ff8a6e048db77d21b57502102cee6554cc8ac297afaaa29101f2a04da
-
SSDEEP
49152:1NMhE2sHLkzhdM3bA5h/r9p5cSFIPdrdFIKs5IzCegTHYjr+Rln2vyprCUjaBNc:WM0t9p5pM1s2ibYX+Rl2Du
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: tmp.exe File opened (read-only) \??\R: tmp.exe File opened (read-only) \??\X: tmp.exe File opened (read-only) \??\Y: tmp.exe File opened (read-only) \??\H: tmp.exe File opened (read-only) \??\J: tmp.exe File opened (read-only) \??\S: tmp.exe File opened (read-only) \??\W: tmp.exe File opened (read-only) \??\U: tmp.exe File opened (read-only) \??\V: tmp.exe File opened (read-only) \??\Z: tmp.exe File opened (read-only) \??\F: tmp.exe File opened (read-only) \??\G: tmp.exe File opened (read-only) \??\L: tmp.exe File opened (read-only) \??\Q: tmp.exe File opened (read-only) \??\N: tmp.exe File opened (read-only) \??\O: tmp.exe File opened (read-only) \??\P: tmp.exe File opened (read-only) \??\T: tmp.exe File opened (read-only) \??\B: tmp.exe File opened (read-only) \??\I: tmp.exe File opened (read-only) \??\K: tmp.exe File opened (read-only) \??\M: tmp.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 37 IoCs
pid Process 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe 2504 tmp.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz tmp.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2504 tmp.exe 2504 tmp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2504 tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2504