Analysis
-
max time kernel
118s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 18:58
Behavioral task
behavioral1
Sample
363042d78c829792621a574eda1eae5d.exe
Resource
win7-20231215-en
General
-
Target
363042d78c829792621a574eda1eae5d.exe
-
Size
681KB
-
MD5
363042d78c829792621a574eda1eae5d
-
SHA1
6d732a2cb849540d4390dc1fff55cf5939fa9fa7
-
SHA256
22ec7ba04eecabcd97718569f3b08f2e5f886e4b096cc3baca864e106f143149
-
SHA512
c6e9843ffb72ac4f42a6b240737503b278fa9aa882d0643dec80040be36fb44b9ecda5e2337c205aefd3ad6a4096689d06efeae8154146d930ddff80e0a23f73
-
SSDEEP
12288:8wEZxZLDznQwo5unUeArTE5yjgcy7LxOuH9/7HPuXRZ8dzfPtfdeEvnrvdXZPTh4:rEZxZLHnQwOunXLpvwuVbKz81VfTFXZm
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 363042d78c829792621a574eda1eae5d.exe -
resource yara_rule behavioral1/memory/2172-0-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2172-1-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2172-33-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2172-34-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2172-35-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2172-36-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2172-37-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2172-38-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2172-39-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2172-40-0x0000000000400000-0x00000000005CC000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 363042d78c829792621a574eda1eae5d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 363042d78c829792621a574eda1eae5d.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main 363042d78c829792621a574eda1eae5d.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2172 363042d78c829792621a574eda1eae5d.exe 2172 363042d78c829792621a574eda1eae5d.exe 2172 363042d78c829792621a574eda1eae5d.exe 2172 363042d78c829792621a574eda1eae5d.exe 2172 363042d78c829792621a574eda1eae5d.exe 2172 363042d78c829792621a574eda1eae5d.exe 2172 363042d78c829792621a574eda1eae5d.exe 2172 363042d78c829792621a574eda1eae5d.exe 2172 363042d78c829792621a574eda1eae5d.exe 2172 363042d78c829792621a574eda1eae5d.exe 2172 363042d78c829792621a574eda1eae5d.exe 2172 363042d78c829792621a574eda1eae5d.exe 2172 363042d78c829792621a574eda1eae5d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\363042d78c829792621a574eda1eae5d.exe"C:\Users\Admin\AppData\Local\Temp\363042d78c829792621a574eda1eae5d.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172