Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 04:00
Behavioral task
behavioral1
Sample
527785f61a3ff10e070aea5cb59e2477.exe
Resource
win7-20231215-en
General
-
Target
527785f61a3ff10e070aea5cb59e2477.exe
-
Size
677KB
-
MD5
527785f61a3ff10e070aea5cb59e2477
-
SHA1
b5e27300e52bcc33cf10f3635a65c02ec6cc7d60
-
SHA256
244e315bbaf623c2112954d1b6e3c0cbd247825db9a04acf2c872e4a8c1c1ba4
-
SHA512
adbe68745c850b423793806cfe742221eea33013e9004a249df5ae07bcce877c5651c2cbea657cefe1bae481b62efb9efd2b3642d5d085a1daef6dc8ff9b711f
-
SSDEEP
12288:MRO2Q8Iu71MZvr2ymO6l4S+obhFIVgFmO/oG3G+zQmS+Lrv7KXpQB9EzDk8BAZ0c:mm88Kjh4SnbMKFmO/osPTS8v7KXpQBqE
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 527785f61a3ff10e070aea5cb59e2477.exe -
resource yara_rule behavioral1/memory/2508-0-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2508-19-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2508-20-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2508-21-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2508-22-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2508-23-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2508-24-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2508-25-0x0000000000400000-0x00000000005CC000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 527785f61a3ff10e070aea5cb59e2477.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 527785f61a3ff10e070aea5cb59e2477.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main 527785f61a3ff10e070aea5cb59e2477.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2508 527785f61a3ff10e070aea5cb59e2477.exe 2508 527785f61a3ff10e070aea5cb59e2477.exe 2508 527785f61a3ff10e070aea5cb59e2477.exe 2508 527785f61a3ff10e070aea5cb59e2477.exe 2508 527785f61a3ff10e070aea5cb59e2477.exe 2508 527785f61a3ff10e070aea5cb59e2477.exe 2508 527785f61a3ff10e070aea5cb59e2477.exe 2508 527785f61a3ff10e070aea5cb59e2477.exe 2508 527785f61a3ff10e070aea5cb59e2477.exe 2508 527785f61a3ff10e070aea5cb59e2477.exe 2508 527785f61a3ff10e070aea5cb59e2477.exe 2508 527785f61a3ff10e070aea5cb59e2477.exe 2508 527785f61a3ff10e070aea5cb59e2477.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\527785f61a3ff10e070aea5cb59e2477.exe"C:\Users\Admin\AppData\Local\Temp\527785f61a3ff10e070aea5cb59e2477.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508