Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 11:37
Static task
static1
Behavioral task
behavioral1
Sample
95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe
Resource
win10v2004-20230915-en
General
-
Target
95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe
-
Size
4.3MB
-
MD5
fb16afc4b20c031a7100940c34135011
-
SHA1
6cd0fd9f167d9f786dcdf52f11179c232a289319
-
SHA256
95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8
-
SHA512
ec6af2fdf965e1a3dc1ee7e79b4c0565162d63c5b4a715b813c30c099ddabc516093a973a9839e17743d7be052fac5e2ead5a160b754897141b74d3500837f2b
-
SSDEEP
49152:zOTUpzp61UZ8BKo6F2yI0XGSBgVFMXqhM4jSYkQgFcwG1XGBePnzHXtP8sCAL7PC:zOTW2UZbvjXGNLhMM2mhzdP8DAL7USPA
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 34 IoCs
pid Process 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe 3348 95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe"C:\Users\Admin\AppData\Local\Temp\95691989d438644257d5f7a9604b67cd5d6ba31f4f61891a423c2f1acc6eedc8.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3348