Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-06-2023 19:40
Static task
static1
Behavioral task
behavioral1
Sample
931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe
Resource
win10v2004-20230221-en
General
-
Target
931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe
-
Size
4.7MB
-
MD5
18d4681e1c49aead9be4d970968f1318
-
SHA1
24f30ce448ad576053cfb929e75a9a8713785c8a
-
SHA256
931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f
-
SHA512
20f68888e1fac0d04b7603b83a15cbf1df7ff644dcd8e939f1edd03c114a5b2ec25fda7feb6cc2ec09e88b5c5bfb6ef5bd1dc691afb80dd7ba063fce1891f0b7
-
SSDEEP
98304:4kwygSQAlBf0l66j2Vf8GQydbG1Ex7tVkEKj6wBMB+qwtdbE0fXl:uiul6RVkGQydbzZV2jFmrwt9fXl
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File opened for modification C:\Program Files\drmsoftfc75d\fqcx\Anti-Flag.pdb 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe File created C:\Program Files\drmsoftfc75d\+G+-++-+¦˜.exe 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe File opened for modification C:\Program Files\drmsoftfc75d\+G+-++-+¦˜.exe 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe File opened for modification C:\Program Files\drmsoftfc75d\++-+¦˜.png 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe File created C:\Program Files\drmsoftfc75d\++-++·-+.exe 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe File opened for modification C:\Program Files\drmsoftfc75d\++-++·-+.exe 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe File created C:\Program Files\drmsoftfc75d\drm.tmp 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe File created C:\Program Files\drmsoftfc75d\fqcx\Anti-Flag.pdb 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe File opened for modification C:\Program Files\drmsoftfc75d\drm.tmp 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe File created C:\Program Files\drmsoftfc75d\fqcx\D2R HWID.exe 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe File opened for modification C:\Program Files\drmsoftfc75d\fqcx\D2R HWID.pdb 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe File opened for modification C:\Program Files\drmsoftfc75d\ 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe File created C:\Program Files\drmsoftfc75d\44.png 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe File created C:\Program Files\drmsoftfc75d\fqcx\D2R HWID.pdb 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe File created C:\Program Files\drmsoftfc75d\++-+¦˜.png 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe File opened for modification C:\Program Files\drmsoftfc75d\ÓÎÏ·ÖúÊÖ.exe 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe File opened for modification C:\Program Files\drmsoftfc75d\44.png 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe File opened for modification C:\Program Files\drmsoftfc75d\fqcx\D2R HWID.exe 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBIOSDate 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe -
Modifies Control Panel 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Control Panel\International\sShortDate = "yyyy-MM-dd" 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Control Panel\International\iDate = "2" 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Control Panel\International\sDate = "-" 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1100 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1100 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe 1100 931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe"C:\Users\Admin\AppData\Local\Temp\931ee5f29f21b47ebbdb282bd919ce55c1641b7807a5a464d1563e95ffc6bc9f.exe"1⤵
- Checks BIOS information in registry
- Drops file in Program Files directory
- Enumerates system info in registry
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1100