Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 17:53
Static task
static1
Behavioral task
behavioral1
Sample
327039c8a996bf4039bc099681c94f8b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
327039c8a996bf4039bc099681c94f8b.exe
Resource
win10v2004-20231222-en
General
-
Target
327039c8a996bf4039bc099681c94f8b.exe
-
Size
570KB
-
MD5
327039c8a996bf4039bc099681c94f8b
-
SHA1
1ab467c40b6657459444fe75b23f72d7e0f1bd6a
-
SHA256
237e34fdf28f651e6a94f8261dbd5e178595dbf08a45a0dbbec1af441cf5e0e4
-
SHA512
78aaae5c0c567fdd2e3f258b95c5ed2d12b15421bc34cc08500427dd9d085de76d82dfd3edfdad1d36c4f4f0c3e3b129abc5089469c7cc5df9424e0552dc5ba0
-
SSDEEP
12288:TJtxXpzNquXxf52Tp48Dskkl/nmXqY7EglxLthdM7W3vDbH:tt7JDB52lf3w+XqY7NlZdiiH
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 327039c8a996bf4039bc099681c94f8b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 327039c8a996bf4039bc099681c94f8b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 327039c8a996bf4039bc099681c94f8b.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main 327039c8a996bf4039bc099681c94f8b.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2440 327039c8a996bf4039bc099681c94f8b.exe Token: SeIncBasePriorityPrivilege 2440 327039c8a996bf4039bc099681c94f8b.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2440 327039c8a996bf4039bc099681c94f8b.exe 2440 327039c8a996bf4039bc099681c94f8b.exe 2440 327039c8a996bf4039bc099681c94f8b.exe 2440 327039c8a996bf4039bc099681c94f8b.exe 2440 327039c8a996bf4039bc099681c94f8b.exe 2440 327039c8a996bf4039bc099681c94f8b.exe 2440 327039c8a996bf4039bc099681c94f8b.exe 2440 327039c8a996bf4039bc099681c94f8b.exe 2440 327039c8a996bf4039bc099681c94f8b.exe 2440 327039c8a996bf4039bc099681c94f8b.exe 2440 327039c8a996bf4039bc099681c94f8b.exe 2440 327039c8a996bf4039bc099681c94f8b.exe 2440 327039c8a996bf4039bc099681c94f8b.exe 2440 327039c8a996bf4039bc099681c94f8b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\327039c8a996bf4039bc099681c94f8b.exe"C:\Users\Admin\AppData\Local\Temp\327039c8a996bf4039bc099681c94f8b.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2440