Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 23:52
Static task
static1
Behavioral task
behavioral1
Sample
4478523c771c245e2a31b7a02d909833.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4478523c771c245e2a31b7a02d909833.exe
Resource
win10v2004-20231215-en
General
-
Target
4478523c771c245e2a31b7a02d909833.exe
-
Size
873KB
-
MD5
4478523c771c245e2a31b7a02d909833
-
SHA1
607f57b6c2277c018121a229cd21fd825c81f497
-
SHA256
16788c4a4f68ce9d1c7efecc8b0d536c9a63b3b843b342a04ffea37e6ab55bed
-
SHA512
0d238c939272507e9a12750836e775538ae4eb6d31b3cb02e7eafa3319f56a0832e87b1def0a26673437e59ba42fbe5c52aa95e7c113a373d5694f110daba5a9
-
SSDEEP
24576:n33f6iBcSgv6QpC6pvQcHeIFTpQuUmAHoEy:nf6YcS01vQgVdcFy
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4478523c771c245e2a31b7a02d909833.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4478523c771c245e2a31b7a02d909833.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4478523c771c245e2a31b7a02d909833.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 4478523c771c245e2a31b7a02d909833.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 4478523c771c245e2a31b7a02d909833.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 4478523c771c245e2a31b7a02d909833.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 4478523c771c245e2a31b7a02d909833.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2948 set thread context of 3016 2948 4478523c771c245e2a31b7a02d909833.exe 20 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main 4478523c771c245e2a31b7a02d909833.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 4478523c771c245e2a31b7a02d909833.exe 3016 4478523c771c245e2a31b7a02d909833.exe 3016 4478523c771c245e2a31b7a02d909833.exe 3016 4478523c771c245e2a31b7a02d909833.exe 3016 4478523c771c245e2a31b7a02d909833.exe 3016 4478523c771c245e2a31b7a02d909833.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2948 wrote to memory of 3016 2948 4478523c771c245e2a31b7a02d909833.exe 20 PID 2948 wrote to memory of 3016 2948 4478523c771c245e2a31b7a02d909833.exe 20 PID 2948 wrote to memory of 3016 2948 4478523c771c245e2a31b7a02d909833.exe 20 PID 2948 wrote to memory of 3016 2948 4478523c771c245e2a31b7a02d909833.exe 20 PID 2948 wrote to memory of 3016 2948 4478523c771c245e2a31b7a02d909833.exe 20 PID 2948 wrote to memory of 3016 2948 4478523c771c245e2a31b7a02d909833.exe 20 PID 2948 wrote to memory of 3016 2948 4478523c771c245e2a31b7a02d909833.exe 20 PID 2948 wrote to memory of 3016 2948 4478523c771c245e2a31b7a02d909833.exe 20 PID 2948 wrote to memory of 3016 2948 4478523c771c245e2a31b7a02d909833.exe 20 PID 2948 wrote to memory of 3016 2948 4478523c771c245e2a31b7a02d909833.exe 20 PID 2948 wrote to memory of 3016 2948 4478523c771c245e2a31b7a02d909833.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\4478523c771c245e2a31b7a02d909833.exe"C:\Users\Admin\AppData\Local\Temp\4478523c771c245e2a31b7a02d909833.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\4478523c771c245e2a31b7a02d909833.exe"C:\Users\Admin\AppData\Local\Temp\4478523c771c245e2a31b7a02d909833.exe" Track=""2⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-