Analysis
-
max time kernel
18s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 23:33
Behavioral task
behavioral1
Sample
202200dfff1c2a52eec188bb3f5e2fa0.exe
Resource
win7-20231215-en
General
-
Target
202200dfff1c2a52eec188bb3f5e2fa0.exe
-
Size
666KB
-
MD5
202200dfff1c2a52eec188bb3f5e2fa0
-
SHA1
f9b62737de3d7d091df4b7f7dcd3fdb8f8924bd5
-
SHA256
d9fe610a1ef8feee7dc97ae83b966f8dd19a53715106e5db4b12137ea6e56bb6
-
SHA512
756877b58a2f5fb5e4b35d28cb648efb0d8e9adb2c638b083656ab2d1cc115d334ed31bf172b70e544e81e75896b42d570dfdd148f3bc4fc78c733be8c8747a6
-
SSDEEP
12288:ibDqEkMs4q48IAeP0PifTEurPbvdqJplapLWTICNIYPKMTWN4t4OAUw91zRwIMfN:iXbs48LeP0P8E6dclWLi26KGOqMwIMl
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 202200dfff1c2a52eec188bb3f5e2fa0.exe -
resource yara_rule behavioral1/memory/1280-0-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/1280-25-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/1280-26-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/1280-27-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/1280-28-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/1280-29-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/1280-30-0x0000000000400000-0x00000000005C7000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 202200dfff1c2a52eec188bb3f5e2fa0.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 202200dfff1c2a52eec188bb3f5e2fa0.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1280 202200dfff1c2a52eec188bb3f5e2fa0.exe 1280 202200dfff1c2a52eec188bb3f5e2fa0.exe 1280 202200dfff1c2a52eec188bb3f5e2fa0.exe 1280 202200dfff1c2a52eec188bb3f5e2fa0.exe