Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 10:56
Static task
static1
Behavioral task
behavioral1
Sample
6906b3f29d3b67626c523cefa3666140.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6906b3f29d3b67626c523cefa3666140.exe
Resource
win10v2004-20231215-en
General
-
Target
6906b3f29d3b67626c523cefa3666140.exe
-
Size
589KB
-
MD5
6906b3f29d3b67626c523cefa3666140
-
SHA1
e7f5a740eb709785e57e9b4455a3d50f1a215e45
-
SHA256
02a767f4628f1f2a86ca515e5e9eb73fce76f4e08501cf4f14882ccf3c0d0d40
-
SHA512
32bc40bc9531418ce0d9b665d2fa9771151708c6bc921f46277f264a77a4adf18fd1be50e9abe606c4c0ac8c76bc84ae6976d3521d9ea77ab2de5a95ba151d90
-
SSDEEP
12288:i4efV5INoSUUgDp8YROY1Rxi27DuSK8p6a70RxIza/eL8bWC:ijINoSGp8kOYli27DFBIa70R3/eLsr
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6906b3f29d3b67626c523cefa3666140.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 6906b3f29d3b67626c523cefa3666140.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 6906b3f29d3b67626c523cefa3666140.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main 6906b3f29d3b67626c523cefa3666140.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2088 6906b3f29d3b67626c523cefa3666140.exe 2088 6906b3f29d3b67626c523cefa3666140.exe 2088 6906b3f29d3b67626c523cefa3666140.exe 2088 6906b3f29d3b67626c523cefa3666140.exe 2088 6906b3f29d3b67626c523cefa3666140.exe 2088 6906b3f29d3b67626c523cefa3666140.exe 2088 6906b3f29d3b67626c523cefa3666140.exe 2088 6906b3f29d3b67626c523cefa3666140.exe 2088 6906b3f29d3b67626c523cefa3666140.exe 2088 6906b3f29d3b67626c523cefa3666140.exe 2088 6906b3f29d3b67626c523cefa3666140.exe 2088 6906b3f29d3b67626c523cefa3666140.exe 2088 6906b3f29d3b67626c523cefa3666140.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6906b3f29d3b67626c523cefa3666140.exe"C:\Users\Admin\AppData\Local\Temp\6906b3f29d3b67626c523cefa3666140.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088