Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231020-es -
resource tags
arch:x64arch:x86image:win7-20231020-eslocale:es-esos:windows7-x64systemwindows -
submitted
03/11/2023, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
8022EmisorZQCK1427Fact_A0904-51454426.exe
Resource
win7-20231020-es
Behavioral task
behavioral2
Sample
8022EmisorZQCK1427Fact_A0904-51454426.exe
Resource
win10v2004-20231023-es
Behavioral task
behavioral3
Sample
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~7150IMFQ4795ALYO6447.dll
Resource
win7-20231020-es
Behavioral task
behavioral4
Sample
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~7150IMFQ4795ALYO6447.dll
Resource
win10v2004-20231023-es
General
-
Target
8022EmisorZQCK1427Fact_A0904-51454426.exe
-
Size
115.2MB
-
MD5
27345a4e1ba76d43846b9c3ddc55d40a
-
SHA1
33831162ff19c187542e6f733dccba41ecb9191b
-
SHA256
008a39ade4ed9e08b88262f629a4e53dc32c2ce72e6599e0181089d43b540c4a
-
SHA512
57dbd726cbbd086fbb08d6f4e7912a954bfa4596a2268dfc92b60dc26e048af10c5369cb53f656b45ce8c47c657ed83bde8155186037bb1691eda8d8e28afb76
-
SSDEEP
98304:6TloAxlJ3DP/Yf1IOIldRoFzaGIRCxNKp5ZnYVET1+JUoKSJo:6ZoAx3c98d5GV8p5ZnAo+Wum
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 8022EmisorZQCK1427Fact_A0904-51454426.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8022EmisorZQCK1427Fact_A0904-51454426.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 8022EmisorZQCK1427Fact_A0904-51454426.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName 8022EmisorZQCK1427Fact_A0904-51454426.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion 8022EmisorZQCK1427Fact_A0904-51454426.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS 8022EmisorZQCK1427Fact_A0904-51454426.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2848 8022EmisorZQCK1427Fact_A0904-51454426.exe 2848 8022EmisorZQCK1427Fact_A0904-51454426.exe 2848 8022EmisorZQCK1427Fact_A0904-51454426.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2848 8022EmisorZQCK1427Fact_A0904-51454426.exe 2848 8022EmisorZQCK1427Fact_A0904-51454426.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8022EmisorZQCK1427Fact_A0904-51454426.exe"C:\Users\Admin\AppData\Local\Temp\8022EmisorZQCK1427Fact_A0904-51454426.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2848