Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
0632f3206710bfb03d406c2a08d61091.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0632f3206710bfb03d406c2a08d61091.exe
Resource
win10v2004-20231222-en
General
-
Target
0632f3206710bfb03d406c2a08d61091.exe
-
Size
595KB
-
MD5
0632f3206710bfb03d406c2a08d61091
-
SHA1
d77e45dbb43deb0455a0291771b108e192a940be
-
SHA256
1019cfc599606a6ca37fdbee2ac24a362bf67b0a6fd27db55ce7814517c0fe8e
-
SHA512
261fc77a4fccc046283e329090da292002f56583f633d27e406a59f11cbf268837c1d022e7d830e554943f69d6082c90d862dae4ea66af830cf7479bfcf679bc
-
SSDEEP
12288:X+xcAJqomzNMA964tgVFRT0EE5aUbm1uG58MSe0zMts:X+xcAJUNMA9/tgVjI5rm1d6rd
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0632f3206710bfb03d406c2a08d61091.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0632f3206710bfb03d406c2a08d61091.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 0632f3206710bfb03d406c2a08d61091.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main 0632f3206710bfb03d406c2a08d61091.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1812 0632f3206710bfb03d406c2a08d61091.exe 1812 0632f3206710bfb03d406c2a08d61091.exe 1812 0632f3206710bfb03d406c2a08d61091.exe 1812 0632f3206710bfb03d406c2a08d61091.exe 1812 0632f3206710bfb03d406c2a08d61091.exe 1812 0632f3206710bfb03d406c2a08d61091.exe 1812 0632f3206710bfb03d406c2a08d61091.exe 1812 0632f3206710bfb03d406c2a08d61091.exe 1812 0632f3206710bfb03d406c2a08d61091.exe 1812 0632f3206710bfb03d406c2a08d61091.exe 1812 0632f3206710bfb03d406c2a08d61091.exe 1812 0632f3206710bfb03d406c2a08d61091.exe 1812 0632f3206710bfb03d406c2a08d61091.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0632f3206710bfb03d406c2a08d61091.exe"C:\Users\Admin\AppData\Local\Temp\0632f3206710bfb03d406c2a08d61091.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1812