Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 06:52
Static task
static1
Behavioral task
behavioral1
Sample
5ad6e9f4b69ab8d6d92f1e6648b15029.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5ad6e9f4b69ab8d6d92f1e6648b15029.exe
Resource
win10v2004-20231215-en
General
-
Target
5ad6e9f4b69ab8d6d92f1e6648b15029.exe
-
Size
561KB
-
MD5
5ad6e9f4b69ab8d6d92f1e6648b15029
-
SHA1
e4940779198e1c3a24f079a2f3c29a2d94443e85
-
SHA256
04a40d1aa8e9508f7d61951d63c406ea8ba6d7b30d29db13c7cc8d4350bb601e
-
SHA512
90bc06e68228db4141107ee283215db7381ccf4f860c13f0ce12862ff62fb617f7cdfea3e52dccb9f792f528c443e18f18d383df9672a7bde5af175d52b62b87
-
SSDEEP
12288:INEg9C3J4UdIpXHkJA28fIkAX8/qdv3Jmaki:4I4/pD2Iu8/0v3dv
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5ad6e9f4b69ab8d6d92f1e6648b15029.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 5ad6e9f4b69ab8d6d92f1e6648b15029.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 5ad6e9f4b69ab8d6d92f1e6648b15029.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main 5ad6e9f4b69ab8d6d92f1e6648b15029.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 816 5ad6e9f4b69ab8d6d92f1e6648b15029.exe 816 5ad6e9f4b69ab8d6d92f1e6648b15029.exe 816 5ad6e9f4b69ab8d6d92f1e6648b15029.exe 816 5ad6e9f4b69ab8d6d92f1e6648b15029.exe 816 5ad6e9f4b69ab8d6d92f1e6648b15029.exe 816 5ad6e9f4b69ab8d6d92f1e6648b15029.exe 816 5ad6e9f4b69ab8d6d92f1e6648b15029.exe 816 5ad6e9f4b69ab8d6d92f1e6648b15029.exe 816 5ad6e9f4b69ab8d6d92f1e6648b15029.exe 816 5ad6e9f4b69ab8d6d92f1e6648b15029.exe 816 5ad6e9f4b69ab8d6d92f1e6648b15029.exe 816 5ad6e9f4b69ab8d6d92f1e6648b15029.exe 816 5ad6e9f4b69ab8d6d92f1e6648b15029.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ad6e9f4b69ab8d6d92f1e6648b15029.exe"C:\Users\Admin\AppData\Local\Temp\5ad6e9f4b69ab8d6d92f1e6648b15029.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:816