Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 08:26
Behavioral task
behavioral1
Sample
11e2a6ac0a00afb662a9537ff9d48b61.exe
Resource
win7-20231215-en
General
-
Target
11e2a6ac0a00afb662a9537ff9d48b61.exe
-
Size
663KB
-
MD5
11e2a6ac0a00afb662a9537ff9d48b61
-
SHA1
8e4bf7cb6d4a6ddb3062da2ac68e47239fa6c768
-
SHA256
d19ecdc54730a45c376f5182b7271b94b1aa902344522d3002a2d34f0d6e1418
-
SHA512
ec374ad9c0b59a226b80705c5f6d2c42e615af12da617540253e5a3beb81f7ef3e88cbfff360d632ec75cc43ce449f4e3d5d4de71db5e5224f7910ce0faa9a13
-
SSDEEP
12288:qbDqEkMs4q48IAeP0PifTEurPbvdqJplapLWTICNIYPKMTWN4t4OAUw91zRwIMf8:qXbs48LeP0P8E6dclWLi26KGOqMwIM
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 11e2a6ac0a00afb662a9537ff9d48b61.exe -
resource yara_rule behavioral1/memory/2928-0-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2928-34-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2928-35-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2928-36-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2928-37-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2928-38-0x0000000000400000-0x00000000005C7000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 11e2a6ac0a00afb662a9537ff9d48b61.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 11e2a6ac0a00afb662a9537ff9d48b61.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main 11e2a6ac0a00afb662a9537ff9d48b61.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2928 11e2a6ac0a00afb662a9537ff9d48b61.exe 2928 11e2a6ac0a00afb662a9537ff9d48b61.exe 2928 11e2a6ac0a00afb662a9537ff9d48b61.exe 2928 11e2a6ac0a00afb662a9537ff9d48b61.exe 2928 11e2a6ac0a00afb662a9537ff9d48b61.exe 2928 11e2a6ac0a00afb662a9537ff9d48b61.exe 2928 11e2a6ac0a00afb662a9537ff9d48b61.exe 2928 11e2a6ac0a00afb662a9537ff9d48b61.exe 2928 11e2a6ac0a00afb662a9537ff9d48b61.exe 2928 11e2a6ac0a00afb662a9537ff9d48b61.exe 2928 11e2a6ac0a00afb662a9537ff9d48b61.exe 2928 11e2a6ac0a00afb662a9537ff9d48b61.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11e2a6ac0a00afb662a9537ff9d48b61.exe"C:\Users\Admin\AppData\Local\Temp\11e2a6ac0a00afb662a9537ff9d48b61.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d