Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 06:52

General

  • Target

    5ad6e9f4b69ab8d6d92f1e6648b15029.exe

  • Size

    561KB

  • MD5

    5ad6e9f4b69ab8d6d92f1e6648b15029

  • SHA1

    e4940779198e1c3a24f079a2f3c29a2d94443e85

  • SHA256

    04a40d1aa8e9508f7d61951d63c406ea8ba6d7b30d29db13c7cc8d4350bb601e

  • SHA512

    90bc06e68228db4141107ee283215db7381ccf4f860c13f0ce12862ff62fb617f7cdfea3e52dccb9f792f528c443e18f18d383df9672a7bde5af175d52b62b87

  • SSDEEP

    12288:INEg9C3J4UdIpXHkJA28fIkAX8/qdv3Jmaki:4I4/pD2Iu8/0v3dv

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ad6e9f4b69ab8d6d92f1e6648b15029.exe
    "C:\Users\Admin\AppData\Local\Temp\5ad6e9f4b69ab8d6d92f1e6648b15029.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:816

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/816-0-0x0000000000400000-0x00000000005CC000-memory.dmp

          Filesize

          1.8MB

        • memory/816-22-0x0000000000400000-0x00000000005CC000-memory.dmp

          Filesize

          1.8MB

        • memory/816-23-0x0000000000400000-0x00000000005CC000-memory.dmp

          Filesize

          1.8MB

        • memory/816-24-0x0000000000400000-0x00000000005CC000-memory.dmp

          Filesize

          1.8MB

        • memory/816-25-0x0000000000400000-0x00000000005CC000-memory.dmp

          Filesize

          1.8MB

        • memory/816-26-0x0000000000400000-0x00000000005CC000-memory.dmp

          Filesize

          1.8MB