Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 04:39
Behavioral task
behavioral1
Sample
54e1376157ac70b04a7480dca06ae1df.exe
Resource
win7-20231215-en
General
-
Target
54e1376157ac70b04a7480dca06ae1df.exe
-
Size
666KB
-
MD5
54e1376157ac70b04a7480dca06ae1df
-
SHA1
8900334d935015fedcef784af09a8c93794884ab
-
SHA256
159ed08e7533db44bbc517bafd0adc532783bdc3400d7af02d01c324edd1bafa
-
SHA512
7201da372de8161cab1733952ab6fa1887a3d0db5bc7c4d3929faa3413f53c6871f0257895504e802d00c6f99ba12f5d38661bff33b7aa73dc1492bb2ad9b78a
-
SSDEEP
12288:DbDqEkMs4q48IAeP0PifTEurPbvdqJplapLWTICNIYPKMTWN4t4OAUw91zRwIMfO:DXbs48LeP0P8E6dclWLi26KGOqMwIM9w
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 54e1376157ac70b04a7480dca06ae1df.exe -
resource yara_rule behavioral1/memory/2276-0-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2276-29-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2276-30-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2276-31-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2276-32-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2276-33-0x0000000000400000-0x00000000005C7000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 54e1376157ac70b04a7480dca06ae1df.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 54e1376157ac70b04a7480dca06ae1df.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main 54e1376157ac70b04a7480dca06ae1df.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2276 54e1376157ac70b04a7480dca06ae1df.exe 2276 54e1376157ac70b04a7480dca06ae1df.exe 2276 54e1376157ac70b04a7480dca06ae1df.exe 2276 54e1376157ac70b04a7480dca06ae1df.exe 2276 54e1376157ac70b04a7480dca06ae1df.exe 2276 54e1376157ac70b04a7480dca06ae1df.exe 2276 54e1376157ac70b04a7480dca06ae1df.exe 2276 54e1376157ac70b04a7480dca06ae1df.exe 2276 54e1376157ac70b04a7480dca06ae1df.exe 2276 54e1376157ac70b04a7480dca06ae1df.exe 2276 54e1376157ac70b04a7480dca06ae1df.exe 2276 54e1376157ac70b04a7480dca06ae1df.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\54e1376157ac70b04a7480dca06ae1df.exe"C:\Users\Admin\AppData\Local\Temp\54e1376157ac70b04a7480dca06ae1df.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2276