Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 23:25
Static task
static1
Behavioral task
behavioral1
Sample
195d808696079810bd89d438fb36792c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
195d808696079810bd89d438fb36792c.exe
Resource
win10v2004-20231222-en
General
-
Target
195d808696079810bd89d438fb36792c.exe
-
Size
521KB
-
MD5
195d808696079810bd89d438fb36792c
-
SHA1
b91a935e6b89b261f632a0c7346ebc38f606cf7d
-
SHA256
06d4f382cb46d7c4e7b88fbfdaa4346ae628106722a67bf555400594c42de765
-
SHA512
718844592a4e7f5999e08d0bbb98a6fdf3436ebe98a4c96bff61e8e8c22c65e1e6b4ded8bd28004c5ca2b7ed74f3db15053fca36d21f3bde18cd6f67d074c524
-
SSDEEP
12288:jL7GuyK/RFuWzlbyCCVUVrvet55WaVwzOFd2RnKLbNaQ/CX2xVkN:nXyidzJynUVc5YaiOGRKXNCuGN
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 195d808696079810bd89d438fb36792c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 195d808696079810bd89d438fb36792c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 195d808696079810bd89d438fb36792c.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main 195d808696079810bd89d438fb36792c.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2056 195d808696079810bd89d438fb36792c.exe 2056 195d808696079810bd89d438fb36792c.exe 2056 195d808696079810bd89d438fb36792c.exe 2056 195d808696079810bd89d438fb36792c.exe 2056 195d808696079810bd89d438fb36792c.exe 2056 195d808696079810bd89d438fb36792c.exe 2056 195d808696079810bd89d438fb36792c.exe 2056 195d808696079810bd89d438fb36792c.exe 2056 195d808696079810bd89d438fb36792c.exe 2056 195d808696079810bd89d438fb36792c.exe 2056 195d808696079810bd89d438fb36792c.exe 2056 195d808696079810bd89d438fb36792c.exe 2056 195d808696079810bd89d438fb36792c.exe 2056 195d808696079810bd89d438fb36792c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\195d808696079810bd89d438fb36792c.exe"C:\Users\Admin\AppData\Local\Temp\195d808696079810bd89d438fb36792c.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056