Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 08:54
Behavioral task
behavioral1
Sample
6185a08ea0b257ded51c52e2d9bf1c03.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6185a08ea0b257ded51c52e2d9bf1c03.exe
Resource
win10v2004-20231222-en
General
-
Target
6185a08ea0b257ded51c52e2d9bf1c03.exe
-
Size
666KB
-
MD5
6185a08ea0b257ded51c52e2d9bf1c03
-
SHA1
7ccef357a70a1a71d0aa61d15b957309448fa7fa
-
SHA256
1683c744c8f28f2d6a0505761cf8675f1939e99a9847b9799fdfc1fa16333af7
-
SHA512
c6f746ef549482cfa638149f3bea6583c991784b35864af17f88047ea3db648ca57cdd51a0f9e147aa803c8b6f2d2d7b02b38f9975384e4f9ef1038dde3f9c76
-
SSDEEP
12288:SbDqEkMs4q48IAeP0PifTEurPbvdqJplapLWTICNIYPKMTWN4t4OAUw91zRwIMf3:SXbs48LeP0P8E6dclWLi26KGOqMwIM/
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6185a08ea0b257ded51c52e2d9bf1c03.exe -
resource yara_rule behavioral1/memory/2316-0-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2316-22-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2316-23-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2316-24-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2316-25-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2316-26-0x0000000000400000-0x00000000005C7000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 6185a08ea0b257ded51c52e2d9bf1c03.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 6185a08ea0b257ded51c52e2d9bf1c03.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main 6185a08ea0b257ded51c52e2d9bf1c03.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2316 6185a08ea0b257ded51c52e2d9bf1c03.exe 2316 6185a08ea0b257ded51c52e2d9bf1c03.exe 2316 6185a08ea0b257ded51c52e2d9bf1c03.exe 2316 6185a08ea0b257ded51c52e2d9bf1c03.exe 2316 6185a08ea0b257ded51c52e2d9bf1c03.exe 2316 6185a08ea0b257ded51c52e2d9bf1c03.exe 2316 6185a08ea0b257ded51c52e2d9bf1c03.exe 2316 6185a08ea0b257ded51c52e2d9bf1c03.exe 2316 6185a08ea0b257ded51c52e2d9bf1c03.exe 2316 6185a08ea0b257ded51c52e2d9bf1c03.exe 2316 6185a08ea0b257ded51c52e2d9bf1c03.exe 2316 6185a08ea0b257ded51c52e2d9bf1c03.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6185a08ea0b257ded51c52e2d9bf1c03.exe"C:\Users\Admin\AppData\Local\Temp\6185a08ea0b257ded51c52e2d9bf1c03.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316