Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 03:37
Behavioral task
behavioral1
Sample
0381cb2010efcb4c79a594c34547323e.exe
Resource
win7-20231215-en
General
-
Target
0381cb2010efcb4c79a594c34547323e.exe
-
Size
678KB
-
MD5
0381cb2010efcb4c79a594c34547323e
-
SHA1
283c4f98188dcdac7bc6b484ef1d6b210bf1c769
-
SHA256
22d9ecf0754f227c21e765eefc1f72277980557d0878edc540f81033ecc48ce0
-
SHA512
e571e3e65bc5e0e03934ea58ed1a329e52b4355e070a78adf7baac35312fd96c71285f6ea38657ae9915ec89eb6a51a33ca14553f1cefa10cdac056e58702c53
-
SSDEEP
12288:jwEZxZLDznQwo5unUeArTE5yjgcy7LxOuH9/7HPuXRZ8dzfPtfdeEvnrvdXZPTh/:kEZxZLHnQwOunXLpvwuVbKz81VfTFXZV
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0381cb2010efcb4c79a594c34547323e.exe -
resource yara_rule behavioral1/memory/2612-0-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2612-19-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2612-20-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2612-21-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2612-22-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2612-23-0x0000000000400000-0x00000000005CC000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0381cb2010efcb4c79a594c34547323e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 0381cb2010efcb4c79a594c34547323e.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main 0381cb2010efcb4c79a594c34547323e.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2612 0381cb2010efcb4c79a594c34547323e.exe 2612 0381cb2010efcb4c79a594c34547323e.exe 2612 0381cb2010efcb4c79a594c34547323e.exe 2612 0381cb2010efcb4c79a594c34547323e.exe 2612 0381cb2010efcb4c79a594c34547323e.exe 2612 0381cb2010efcb4c79a594c34547323e.exe 2612 0381cb2010efcb4c79a594c34547323e.exe 2612 0381cb2010efcb4c79a594c34547323e.exe 2612 0381cb2010efcb4c79a594c34547323e.exe 2612 0381cb2010efcb4c79a594c34547323e.exe 2612 0381cb2010efcb4c79a594c34547323e.exe 2612 0381cb2010efcb4c79a594c34547323e.exe 2612 0381cb2010efcb4c79a594c34547323e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0381cb2010efcb4c79a594c34547323e.exe"C:\Users\Admin\AppData\Local\Temp\0381cb2010efcb4c79a594c34547323e.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612