Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
1616c6a33b3a17a83388b112f10a815d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1616c6a33b3a17a83388b112f10a815d.exe
Resource
win10v2004-20231215-en
General
-
Target
1616c6a33b3a17a83388b112f10a815d.exe
-
Size
1.2MB
-
MD5
1616c6a33b3a17a83388b112f10a815d
-
SHA1
8fa444aa4d7f92a128ed0d86a3745ad3aa8e6039
-
SHA256
11211999630726dee101c07875ee32c4cddbcafe64ac9eec70c3c9adcc9b526f
-
SHA512
b66c9fc1063bb66eabea09097bab426bc4ac3b1b5e3606dd1935170a9d26ed1c3f7dd94857c537529b4609b8d24d6c980d57168fbf7c909096243cfcf8596c63
-
SSDEEP
24576:LCStj/R+pud1sQN6TgXxruXQNjj43/qqy:tr0C/5XIANvMy
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1616c6a33b3a17a83388b112f10a815d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1616c6a33b3a17a83388b112f10a815d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1616c6a33b3a17a83388b112f10a815d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 1616c6a33b3a17a83388b112f10a815d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 1616c6a33b3a17a83388b112f10a815d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 1616c6a33b3a17a83388b112f10a815d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 1616c6a33b3a17a83388b112f10a815d.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3724 set thread context of 2528 3724 1616c6a33b3a17a83388b112f10a815d.exe 45 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2528 1616c6a33b3a17a83388b112f10a815d.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3724 wrote to memory of 2528 3724 1616c6a33b3a17a83388b112f10a815d.exe 45 PID 3724 wrote to memory of 2528 3724 1616c6a33b3a17a83388b112f10a815d.exe 45 PID 3724 wrote to memory of 2528 3724 1616c6a33b3a17a83388b112f10a815d.exe 45 PID 3724 wrote to memory of 2528 3724 1616c6a33b3a17a83388b112f10a815d.exe 45 PID 3724 wrote to memory of 2528 3724 1616c6a33b3a17a83388b112f10a815d.exe 45 PID 3724 wrote to memory of 2528 3724 1616c6a33b3a17a83388b112f10a815d.exe 45 PID 3724 wrote to memory of 2528 3724 1616c6a33b3a17a83388b112f10a815d.exe 45 PID 3724 wrote to memory of 2528 3724 1616c6a33b3a17a83388b112f10a815d.exe 45 PID 3724 wrote to memory of 2528 3724 1616c6a33b3a17a83388b112f10a815d.exe 45 PID 3724 wrote to memory of 2528 3724 1616c6a33b3a17a83388b112f10a815d.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\1616c6a33b3a17a83388b112f10a815d.exe"C:\Users\Admin\AppData\Local\Temp\1616c6a33b3a17a83388b112f10a815d.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\1616c6a33b3a17a83388b112f10a815d.exe"C:\Users\Admin\AppData\Local\Temp\1616c6a33b3a17a83388b112f10a815d.exe" Track="0001001000"2⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:2528
-