Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 22:04
Behavioral task
behavioral1
Sample
1470fd8f8ed1dd49ea329f8f3f7a3ea5.exe
Resource
win7-20231215-en
General
-
Target
1470fd8f8ed1dd49ea329f8f3f7a3ea5.exe
-
Size
666KB
-
MD5
1470fd8f8ed1dd49ea329f8f3f7a3ea5
-
SHA1
33c02f8b91475586f94c3289a95d25da6c9ddfda
-
SHA256
75d92b57b7b7baeda57cf18efad3252b79d6a9eab2c829545ae71eef5c407358
-
SHA512
965547c0f75c47393cbb5db2a821916c78d8e976377fef5f310f1c255e768d15a3c7e892b9d206bc9efc77dc0cff8787472360e168b7c0ba9f4b8d4cb1c420de
-
SSDEEP
12288:tbDqEkMs4q48IAeP0PifTEurPbvdqJplapLWTICNIYPKMTWN4t4OAUw91zRwIMfj:tXbs48LeP0P8E6dclWLi26KGOqMwIM7
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1470fd8f8ed1dd49ea329f8f3f7a3ea5.exe -
resource yara_rule behavioral1/memory/3064-0-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/3064-19-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/3064-20-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/3064-21-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/3064-22-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/3064-23-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/3064-24-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/3064-25-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/3064-26-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/3064-27-0x0000000000400000-0x00000000005C7000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 1470fd8f8ed1dd49ea329f8f3f7a3ea5.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 1470fd8f8ed1dd49ea329f8f3f7a3ea5.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main 1470fd8f8ed1dd49ea329f8f3f7a3ea5.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3064 1470fd8f8ed1dd49ea329f8f3f7a3ea5.exe 3064 1470fd8f8ed1dd49ea329f8f3f7a3ea5.exe 3064 1470fd8f8ed1dd49ea329f8f3f7a3ea5.exe 3064 1470fd8f8ed1dd49ea329f8f3f7a3ea5.exe 3064 1470fd8f8ed1dd49ea329f8f3f7a3ea5.exe 3064 1470fd8f8ed1dd49ea329f8f3f7a3ea5.exe 3064 1470fd8f8ed1dd49ea329f8f3f7a3ea5.exe 3064 1470fd8f8ed1dd49ea329f8f3f7a3ea5.exe 3064 1470fd8f8ed1dd49ea329f8f3f7a3ea5.exe 3064 1470fd8f8ed1dd49ea329f8f3f7a3ea5.exe 3064 1470fd8f8ed1dd49ea329f8f3f7a3ea5.exe 3064 1470fd8f8ed1dd49ea329f8f3f7a3ea5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1470fd8f8ed1dd49ea329f8f3f7a3ea5.exe"C:\Users\Admin\AppData\Local\Temp\1470fd8f8ed1dd49ea329f8f3f7a3ea5.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064