Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 09:11
Static task
static1
Behavioral task
behavioral1
Sample
140827f4c2ec035075559b5d1772bc7b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
140827f4c2ec035075559b5d1772bc7b.exe
Resource
win10v2004-20231215-en
General
-
Target
140827f4c2ec035075559b5d1772bc7b.exe
-
Size
521KB
-
MD5
140827f4c2ec035075559b5d1772bc7b
-
SHA1
f4db0f5aeb7f1116923855719eaf634b4817c240
-
SHA256
13f4453fb187542ee21471ae0e5ddfd42cd33cfea6ad6d4ee12ac27579b60f42
-
SHA512
8573f6266f7dc14367d94078dbc6a80914c4a516898c84302ddeafd131770c804342bca26e4b23dd0e738aaaaf96695cb7f8126a02afcb6261c555653fca251c
-
SSDEEP
12288:jL7GuyK/RFuWzlbyCCVUVrvet55WaVwzOFd2RnKLbNaQ/CX2xVkN:nXyidzJynUVc5YaiOGRKXNCuGN
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 140827f4c2ec035075559b5d1772bc7b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 140827f4c2ec035075559b5d1772bc7b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 140827f4c2ec035075559b5d1772bc7b.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main 140827f4c2ec035075559b5d1772bc7b.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2296 140827f4c2ec035075559b5d1772bc7b.exe 2296 140827f4c2ec035075559b5d1772bc7b.exe 2296 140827f4c2ec035075559b5d1772bc7b.exe 2296 140827f4c2ec035075559b5d1772bc7b.exe 2296 140827f4c2ec035075559b5d1772bc7b.exe 2296 140827f4c2ec035075559b5d1772bc7b.exe 2296 140827f4c2ec035075559b5d1772bc7b.exe 2296 140827f4c2ec035075559b5d1772bc7b.exe 2296 140827f4c2ec035075559b5d1772bc7b.exe 2296 140827f4c2ec035075559b5d1772bc7b.exe 2296 140827f4c2ec035075559b5d1772bc7b.exe 2296 140827f4c2ec035075559b5d1772bc7b.exe 2296 140827f4c2ec035075559b5d1772bc7b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\140827f4c2ec035075559b5d1772bc7b.exe"C:\Users\Admin\AppData\Local\Temp\140827f4c2ec035075559b5d1772bc7b.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296