Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 13:26
Behavioral task
behavioral1
Sample
21a347f55965e4d4355e743e7f386efb.exe
Resource
win7-20231215-en
General
-
Target
21a347f55965e4d4355e743e7f386efb.exe
-
Size
666KB
-
MD5
21a347f55965e4d4355e743e7f386efb
-
SHA1
15e51a6e6f94601d7f2d36a50c42d1f7634c1669
-
SHA256
15707fc7e5440a709c29d44b3b6b125494f2e4b29e6d45f4b6c5cf850395a99c
-
SHA512
a19155461954bee90e00827692058e8e4e96ea4c14676189acbdab966134152570e1f4f1510ff18a3c7c83e9b9babc6be57b66d88004b11f4f10623be6a90695
-
SSDEEP
12288:CbDqEkMs4q48IAeP0PifTEurPbvdqJplapLWTICNIYPKMTWN4t4OAUw91zRwIMf9:CXbs48LeP0P8E6dclWLi26KGOqMwIMF
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 21a347f55965e4d4355e743e7f386efb.exe -
resource yara_rule behavioral1/memory/2408-0-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2408-1-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2408-31-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2408-32-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2408-33-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2408-34-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2408-35-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2408-36-0x0000000000400000-0x00000000005C7000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 21a347f55965e4d4355e743e7f386efb.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 21a347f55965e4d4355e743e7f386efb.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main 21a347f55965e4d4355e743e7f386efb.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2408 21a347f55965e4d4355e743e7f386efb.exe 2408 21a347f55965e4d4355e743e7f386efb.exe 2408 21a347f55965e4d4355e743e7f386efb.exe 2408 21a347f55965e4d4355e743e7f386efb.exe 2408 21a347f55965e4d4355e743e7f386efb.exe 2408 21a347f55965e4d4355e743e7f386efb.exe 2408 21a347f55965e4d4355e743e7f386efb.exe 2408 21a347f55965e4d4355e743e7f386efb.exe 2408 21a347f55965e4d4355e743e7f386efb.exe 2408 21a347f55965e4d4355e743e7f386efb.exe 2408 21a347f55965e4d4355e743e7f386efb.exe 2408 21a347f55965e4d4355e743e7f386efb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21a347f55965e4d4355e743e7f386efb.exe"C:\Users\Admin\AppData\Local\Temp\21a347f55965e4d4355e743e7f386efb.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408