Analysis
-
max time kernel
143s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
0f191fbf06d427352b3850459fe1cb63.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f191fbf06d427352b3850459fe1cb63.exe
Resource
win10v2004-20231215-en
General
-
Target
0f191fbf06d427352b3850459fe1cb63.exe
-
Size
950KB
-
MD5
0f191fbf06d427352b3850459fe1cb63
-
SHA1
397dfab11c054c9529b660fe5ddb559b6074736c
-
SHA256
20e34141ee4dd72ce763d497738aa6716ec29b3c151019772468247fb3abd253
-
SHA512
a1e55daf868c4e3451e6aa4c9b8e64277a2ba0df5e859e63070250a6061caf707f827096ad1dc4fb501d7fc1fda17e6bc4aace18bd131e24b2347393e87eb2ab
-
SSDEEP
12288:T1l4DIi+3ZfyL8USWIgCaYUuUAiOLeMxBrP0gUFoLsNdzWml4F1Qtl6Y45hLipgj:T1W10SSUYUAiOSMxM3zNl4QnAipgnIol
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0f191fbf06d427352b3850459fe1cb63.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0f191fbf06d427352b3850459fe1cb63.exe -
resource yara_rule behavioral1/memory/2864-3-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/2864-8-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/2864-5-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/2864-10-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/2864-11-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/2864-13-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/2864-12-0x0000000000400000-0x00000000004F2000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0f191fbf06d427352b3850459fe1cb63.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 0f191fbf06d427352b3850459fe1cb63.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3016 set thread context of 2864 3016 0f191fbf06d427352b3850459fe1cb63.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 2896 2864 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2864 3016 0f191fbf06d427352b3850459fe1cb63.exe 29 PID 3016 wrote to memory of 2864 3016 0f191fbf06d427352b3850459fe1cb63.exe 29 PID 3016 wrote to memory of 2864 3016 0f191fbf06d427352b3850459fe1cb63.exe 29 PID 3016 wrote to memory of 2864 3016 0f191fbf06d427352b3850459fe1cb63.exe 29 PID 3016 wrote to memory of 2864 3016 0f191fbf06d427352b3850459fe1cb63.exe 29 PID 3016 wrote to memory of 2864 3016 0f191fbf06d427352b3850459fe1cb63.exe 29 PID 3016 wrote to memory of 2864 3016 0f191fbf06d427352b3850459fe1cb63.exe 29 PID 3016 wrote to memory of 2864 3016 0f191fbf06d427352b3850459fe1cb63.exe 29 PID 2864 wrote to memory of 2896 2864 0f191fbf06d427352b3850459fe1cb63.exe 30 PID 2864 wrote to memory of 2896 2864 0f191fbf06d427352b3850459fe1cb63.exe 30 PID 2864 wrote to memory of 2896 2864 0f191fbf06d427352b3850459fe1cb63.exe 30 PID 2864 wrote to memory of 2896 2864 0f191fbf06d427352b3850459fe1cb63.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f191fbf06d427352b3850459fe1cb63.exe"C:\Users\Admin\AppData\Local\Temp\0f191fbf06d427352b3850459fe1cb63.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\0f191fbf06d427352b3850459fe1cb63.exe"C:\Users\Admin\AppData\Local\Temp\0f191fbf06d427352b3850459fe1cb63.exe" Track="0001001000"2⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 2123⤵
- Program crash
PID:2896
-
-