Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe
Resource
win10v2004-20230915-en
General
-
Target
f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe
-
Size
6.2MB
-
MD5
4d1e91397c8c17167da9188cd25f5fa2
-
SHA1
b0f2fe99f4b76ab1b248215ce4c90ba72fe8b6c6
-
SHA256
f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa
-
SHA512
5ef264e5be2589c7ffc08b71151f95cbce949a7037094f18f32ebca3ef416e1dc05d1cfed460e6086313995bb52c86e0a5d39f322704a4ac5f9409df8b930cea
-
SSDEEP
98304:uoHNZepsSVs2Z/oexNikDBqb+9y6V593NWvQW52ivHjOLM5yol+rQR2yOnoC+ZMy:uotZgs21BRddoQlSOLM8gYQVOJ+uhEq2
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2836-8688-0x00000000002E0000-0x00000000002EB000-memory.dmp upx behavioral1/memory/2836-8690-0x00000000003F0000-0x00000000003FB000-memory.dmp upx behavioral1/memory/2836-8692-0x0000000002900000-0x0000000002908000-memory.dmp upx behavioral1/memory/2836-8700-0x00000000002E0000-0x00000000002EB000-memory.dmp upx behavioral1/memory/2836-8702-0x00000000003F0000-0x00000000003FB000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe File opened (read-only) \??\J: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe File opened (read-only) \??\M: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe File opened (read-only) \??\S: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe File opened (read-only) \??\U: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe File opened (read-only) \??\V: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe File opened (read-only) \??\W: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe File opened (read-only) \??\E: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe File opened (read-only) \??\H: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe File opened (read-only) \??\L: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe File opened (read-only) \??\R: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe File opened (read-only) \??\I: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe File opened (read-only) \??\O: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe File opened (read-only) \??\P: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe File opened (read-only) \??\Q: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe File opened (read-only) \??\X: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe File opened (read-only) \??\G: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe File opened (read-only) \??\K: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe File opened (read-only) \??\N: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe File opened (read-only) \??\T: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe File opened (read-only) \??\Y: f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2836 f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe 2836 f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2836 f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe Token: SeDebugPrivilege 2836 f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe"C:\Users\Admin\AppData\Local\Temp\f409a75395596698e0d4af73701c54f3fecb2b383b375f172dd654d8e0c33daa.exe"1⤵
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2836