Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
22-11-2023 09:01
Static task
static1
Behavioral task
behavioral1
Sample
a3242c1ed334a57d9140533e5eddd23be6f06069beaf8e2fa6168f5dd253c6fd.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
a3242c1ed334a57d9140533e5eddd23be6f06069beaf8e2fa6168f5dd253c6fd.exe
Resource
win10v2004-20231023-en
General
-
Target
a3242c1ed334a57d9140533e5eddd23be6f06069beaf8e2fa6168f5dd253c6fd.exe
-
Size
3.1MB
-
MD5
6124a490330985ba9f3975216c197421
-
SHA1
5c0225b582dfa00c5ab20e079bc4845cf7ab32bb
-
SHA256
a3242c1ed334a57d9140533e5eddd23be6f06069beaf8e2fa6168f5dd253c6fd
-
SHA512
801c708f89ca21dc1b82b38b1f3654c4a467d95350d739b8b2123240c73b28581c2aebd324fc0b99fca6fd76350c38fce2f50f755825e70ed41e2c64aab9e0ec
-
SSDEEP
98304:zx43AyMOtFqZzFNSa/IkEOlUvsClwPk5D45CIlzeTGwBJ:GQqtF2+kEOlUkCl16CIlSiwBJ
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a3242c1ed334a57d9140533e5eddd23be6f06069beaf8e2fa6168f5dd253c6fd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2980 a3242c1ed334a57d9140533e5eddd23be6f06069beaf8e2fa6168f5dd253c6fd.exe 2980 a3242c1ed334a57d9140533e5eddd23be6f06069beaf8e2fa6168f5dd253c6fd.exe 2980 a3242c1ed334a57d9140533e5eddd23be6f06069beaf8e2fa6168f5dd253c6fd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3242c1ed334a57d9140533e5eddd23be6f06069beaf8e2fa6168f5dd253c6fd.exe"C:\Users\Admin\AppData\Local\Temp\a3242c1ed334a57d9140533e5eddd23be6f06069beaf8e2fa6168f5dd253c6fd.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2980