Analysis
-
max time kernel
134s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01/09/2023, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe
Resource
win10v2004-20230831-en
General
-
Target
6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe
-
Size
1.3MB
-
MD5
a9137e257297a19e788f62784fcbe4d3
-
SHA1
bccb8ee1e6de4f0ccf85159f0a08265fb1d88332
-
SHA256
6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face
-
SHA512
059a07e4e03531ffde036e2d9a70328592de1df36e6593ac626483e104c213cae2898aaf5a72421c8f7b783333f87b908ba7df291ee24e2dbe70110474ae59dc
-
SSDEEP
24576:X0hzpOR8uLEaZylSfnjEoGV4OiV+5vox8z/rhPV5VGg:Xgo2iV8QWz/VPVp
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct 6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2232 6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe Token: SeIncBasePriorityPrivilege 2232 6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2232 6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe 2232 6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe 2232 6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2232 6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe 2232 6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe 2232 6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2232 6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe 2232 6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe 2232 6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe 2232 6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe"C:\Users\Admin\AppData\Local\Temp\6df7ce51af353eb6679f87bee0729319351d85aaf30e0fc7b446991d12d0face.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5b44dfa5ae18400536cab30a5041b30a1
SHA12ec7c42d36287030a9e41bbccc25f37d20e5eb03
SHA256b3413595fdc2aac538c6da87b97b97d2f3270629db7a0563f6347bdb95a8264c
SHA5120ca52ebe91929e34f168660e90fb9fc8c888af2320ec2d563b24e307e44486f645c34280a8b6a0ed37939074eaf33550f77d0c88143c816ec66f67c040d05695
-
Filesize
2KB
MD5b44dfa5ae18400536cab30a5041b30a1
SHA12ec7c42d36287030a9e41bbccc25f37d20e5eb03
SHA256b3413595fdc2aac538c6da87b97b97d2f3270629db7a0563f6347bdb95a8264c
SHA5120ca52ebe91929e34f168660e90fb9fc8c888af2320ec2d563b24e307e44486f645c34280a8b6a0ed37939074eaf33550f77d0c88143c816ec66f67c040d05695
-
Filesize
1KB
MD53c3ff13d9b89b00ac73bc76bccd39e9a
SHA162a52b99813ed9365261030abaffad7500df80f9
SHA2562cba444138b69292a1c2fb87c2e11fcdb5364c1ba13afa031f879bd58bbff26b
SHA5127351c1ff651390e4bce49c10c91acc20996b43d0d3f6ebfad358381095a211c139c04a708a7f573d1681d10806cb794b4a5e21013c173b1aec0ce3cd2f408f4b