Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 22:44
Static task
static1
Behavioral task
behavioral1
Sample
05fb06b0103396b818d0849c09b37021.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05fb06b0103396b818d0849c09b37021.exe
Resource
win10v2004-20231215-en
General
-
Target
05fb06b0103396b818d0849c09b37021.exe
-
Size
677KB
-
MD5
05fb06b0103396b818d0849c09b37021
-
SHA1
80820493bca87ea1e6ed9e9f12906fa00244b073
-
SHA256
b9cb28a2e7341eea9732633f9e55457ad813d9005ab7bf5dcd9118f753d46695
-
SHA512
6051ebaa81743f72c47c51223d4edd314401358f35503fb66f31f4120e329a12f36994bf60d33c3bec0252a4af642a6b0b900f930c242ab757ce872b0309795d
-
SSDEEP
12288:a9vd0aaxLeAod/tYe+ElXMYM0oCl8YW6t26x/et0:a9vd0DLtelaYtOkfl
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 05fb06b0103396b818d0849c09b37021.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 05fb06b0103396b818d0849c09b37021.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 05fb06b0103396b818d0849c09b37021.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 05fb06b0103396b818d0849c09b37021.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 05fb06b0103396b818d0849c09b37021.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 05fb06b0103396b818d0849c09b37021.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 05fb06b0103396b818d0849c09b37021.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2052 set thread context of 2964 2052 05fb06b0103396b818d0849c09b37021.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main 05fb06b0103396b818d0849c09b37021.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2964 05fb06b0103396b818d0849c09b37021.exe 2964 05fb06b0103396b818d0849c09b37021.exe 2964 05fb06b0103396b818d0849c09b37021.exe 2964 05fb06b0103396b818d0849c09b37021.exe 2964 05fb06b0103396b818d0849c09b37021.exe 2964 05fb06b0103396b818d0849c09b37021.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2964 2052 05fb06b0103396b818d0849c09b37021.exe 29 PID 2052 wrote to memory of 2964 2052 05fb06b0103396b818d0849c09b37021.exe 29 PID 2052 wrote to memory of 2964 2052 05fb06b0103396b818d0849c09b37021.exe 29 PID 2052 wrote to memory of 2964 2052 05fb06b0103396b818d0849c09b37021.exe 29 PID 2052 wrote to memory of 2964 2052 05fb06b0103396b818d0849c09b37021.exe 29 PID 2052 wrote to memory of 2964 2052 05fb06b0103396b818d0849c09b37021.exe 29 PID 2052 wrote to memory of 2964 2052 05fb06b0103396b818d0849c09b37021.exe 29 PID 2052 wrote to memory of 2964 2052 05fb06b0103396b818d0849c09b37021.exe 29 PID 2052 wrote to memory of 2964 2052 05fb06b0103396b818d0849c09b37021.exe 29 PID 2052 wrote to memory of 2964 2052 05fb06b0103396b818d0849c09b37021.exe 29 PID 2052 wrote to memory of 2964 2052 05fb06b0103396b818d0849c09b37021.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\05fb06b0103396b818d0849c09b37021.exe"C:\Users\Admin\AppData\Local\Temp\05fb06b0103396b818d0849c09b37021.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\05fb06b0103396b818d0849c09b37021.exe"C:\Users\Admin\AppData\Local\Temp\05fb06b0103396b818d0849c09b37021.exe" Track="0001001000"2⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-