Analysis
-
max time kernel
120s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
1a9a034dd92e7d8effc027e584341f7c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1a9a034dd92e7d8effc027e584341f7c.exe
Resource
win10v2004-20231222-en
General
-
Target
1a9a034dd92e7d8effc027e584341f7c.exe
-
Size
1.6MB
-
MD5
1a9a034dd92e7d8effc027e584341f7c
-
SHA1
52fee6c098bdf7694f653ae569c1ee0be93affbb
-
SHA256
68dac7ce7e6395eda34f509a5de4af1fe2c1fb1995deadfbe1edc243857def2b
-
SHA512
c09ddd0af589da125811e299ffa6e2ab7aefd9f38494e03805bcf4a00e1d039301a0f57ed41f1717a7bdd601589078fad2082cf5dfca55dd3162eabc4319acb6
-
SSDEEP
24576:+ZJ64ULEVtXGUdKNz+BFQl1EHF+Bk7mNZNATehj0BARUpHNVwthgmw3Ium:+ZkpEVtRdOSBuQr728CRizw/gmwB
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 1a9a034dd92e7d8effc027e584341f7c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1a9a034dd92e7d8effc027e584341f7c.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 1a9a034dd92e7d8effc027e584341f7c.exe -
Modifies registry class 2 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\be1635929245l.hxf\ = add58ba74ab31893ae668715e73f76bd 1a9a034dd92e7d8effc027e584341f7c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\be1635929245l.hxf 1a9a034dd92e7d8effc027e584341f7c.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4528 1a9a034dd92e7d8effc027e584341f7c.exe 4528 1a9a034dd92e7d8effc027e584341f7c.exe 4528 1a9a034dd92e7d8effc027e584341f7c.exe