Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 23:35
Static task
static1
Behavioral task
behavioral1
Sample
0717b88c408cb3f738f71e817cff6e34.exe
Resource
win7-20231129-en
General
-
Target
0717b88c408cb3f738f71e817cff6e34.exe
-
Size
3.6MB
-
MD5
0717b88c408cb3f738f71e817cff6e34
-
SHA1
a7fd35c1000320c20f9cedc5a90a9ec1e3a41dab
-
SHA256
aab74be3f33dd7c8783bef4c91b761bd31a7d83f260f7999e2789fb06f7705e2
-
SHA512
1ab013d1bc152eeaa8db051fa1b1133cdb7d81685b9e1f0e856ef6553b9a63c83b8afa3e255d4762ecf5dac2485bc092b4801ca3c1ad1aedb1b2298c1b0ada62
-
SSDEEP
98304:2oiH7QkwJH4++uZrBAOYSyXIXsB0cgpaZr:l+7QT9+SrBc+cspOr
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x000800000002320a-67.dat aspack_v212_v242 behavioral2/files/0x000800000002320a-65.dat aspack_v212_v242 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer 0717b88c408cb3f738f71e817cff6e34.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName 0717b88c408cb3f738f71e817cff6e34.exe -
Loads dropped DLL 6 IoCs
pid Process 4568 0717b88c408cb3f738f71e817cff6e34.exe 4568 0717b88c408cb3f738f71e817cff6e34.exe 4568 0717b88c408cb3f738f71e817cff6e34.exe 4568 0717b88c408cb3f738f71e817cff6e34.exe 4568 0717b88c408cb3f738f71e817cff6e34.exe 4568 0717b88c408cb3f738f71e817cff6e34.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 0717b88c408cb3f738f71e817cff6e34.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 0717b88c408cb3f738f71e817cff6e34.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 0717b88c408cb3f738f71e817cff6e34.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 0717b88c408cb3f738f71e817cff6e34.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4568 0717b88c408cb3f738f71e817cff6e34.exe 4568 0717b88c408cb3f738f71e817cff6e34.exe 4568 0717b88c408cb3f738f71e817cff6e34.exe 4568 0717b88c408cb3f738f71e817cff6e34.exe 4568 0717b88c408cb3f738f71e817cff6e34.exe 4568 0717b88c408cb3f738f71e817cff6e34.exe 4568 0717b88c408cb3f738f71e817cff6e34.exe 4568 0717b88c408cb3f738f71e817cff6e34.exe 4568 0717b88c408cb3f738f71e817cff6e34.exe 4568 0717b88c408cb3f738f71e817cff6e34.exe 4568 0717b88c408cb3f738f71e817cff6e34.exe 4568 0717b88c408cb3f738f71e817cff6e34.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5d4d67e8e27bcf2c1c4a4b4d3e75adba7
SHA1a1f05f115cd112432bf84f35d2eff2871bed5799
SHA2560ce355e670dea5bd81e323f5be0ea509c02e4ed80a85d9643da167ebac8938ea
SHA512f1baf39b7a5cf13301c60373c347e010e97a43dde376295a477bced6f5822caba17a9661b0efe7a116ab1e54ac35d9a0f50e986dc90f5f9c02bd8267ce0d7b3c