Analysis
-
max time kernel
143s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02-10-2023 11:51
Static task
static1
Behavioral task
behavioral1
Sample
fc72eee3e3d82ddba4d58c2daad501206752b756665a802c30c95d2c73bdea8d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fc72eee3e3d82ddba4d58c2daad501206752b756665a802c30c95d2c73bdea8d.exe
Resource
win10v2004-20230915-en
General
-
Target
fc72eee3e3d82ddba4d58c2daad501206752b756665a802c30c95d2c73bdea8d.exe
-
Size
82.3MB
-
MD5
eb4444b521bbdb154217e33120a89efa
-
SHA1
b4788878c3d14538ab7cb80adb14ca8de2549492
-
SHA256
fc72eee3e3d82ddba4d58c2daad501206752b756665a802c30c95d2c73bdea8d
-
SHA512
2ae353626364dfec720fbe9a6406f9fd9afe091460ac17adca2cdc3e777ada5e57b60703c41f49f8f9c228d8cc8d652f1447770bb3e6bd315fb4be9055556060
-
SSDEEP
786432:HIh8y9YqqpTQMsvGqUwQW3TyMMvNN8L/e7pRvLHJo4y33ik2PUUEcYv/I:o3SDZssWJMsL/ivLpo4yHik2PpSI
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 fc72eee3e3d82ddba4d58c2daad501206752b756665a802c30c95d2c73bdea8d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString fc72eee3e3d82ddba4d58c2daad501206752b756665a802c30c95d2c73bdea8d.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS fc72eee3e3d82ddba4d58c2daad501206752b756665a802c30c95d2c73bdea8d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer fc72eee3e3d82ddba4d58c2daad501206752b756665a802c30c95d2c73bdea8d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName fc72eee3e3d82ddba4d58c2daad501206752b756665a802c30c95d2c73bdea8d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion fc72eee3e3d82ddba4d58c2daad501206752b756665a802c30c95d2c73bdea8d.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2960 fc72eee3e3d82ddba4d58c2daad501206752b756665a802c30c95d2c73bdea8d.exe 2960 fc72eee3e3d82ddba4d58c2daad501206752b756665a802c30c95d2c73bdea8d.exe 2960 fc72eee3e3d82ddba4d58c2daad501206752b756665a802c30c95d2c73bdea8d.exe 2960 fc72eee3e3d82ddba4d58c2daad501206752b756665a802c30c95d2c73bdea8d.exe 2960 fc72eee3e3d82ddba4d58c2daad501206752b756665a802c30c95d2c73bdea8d.exe 2960 fc72eee3e3d82ddba4d58c2daad501206752b756665a802c30c95d2c73bdea8d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc72eee3e3d82ddba4d58c2daad501206752b756665a802c30c95d2c73bdea8d.exe"C:\Users\Admin\AppData\Local\Temp\fc72eee3e3d82ddba4d58c2daad501206752b756665a802c30c95d2c73bdea8d.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:2960