Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 08:49
Behavioral task
behavioral1
Sample
13bab12d611329d20507d52a5711678f.exe
Resource
win7-20231215-en
General
-
Target
13bab12d611329d20507d52a5711678f.exe
-
Size
665KB
-
MD5
13bab12d611329d20507d52a5711678f
-
SHA1
72274aba3eda1a0f183d25d5fe92aa20787e8a87
-
SHA256
5f902c32cffc4c450e18c71df7ad8f421b8c8d5f3af88f72b1105651c0e37b63
-
SHA512
b7ff7f17bfa2d3cd3daf93dedfaf445b2e1916c587594e757f8b5db16b6d3c82c759d801fc21df05ea53fa8031392cd78adbf9c73b23aff81d23ce582b1c6f64
-
SSDEEP
12288:wbDqEkMs4q48IAeP0PifTEurPbvdqJplapLWTICNIYPKMTWN4t4OAUw91zRwIMff:wXbs48LeP0P8E6dclWLi26KGOqMwIMH
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 13bab12d611329d20507d52a5711678f.exe -
resource yara_rule behavioral1/memory/2760-0-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2760-28-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2760-29-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2760-30-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2760-31-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2760-32-0x0000000000400000-0x00000000005C7000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 13bab12d611329d20507d52a5711678f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 13bab12d611329d20507d52a5711678f.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main 13bab12d611329d20507d52a5711678f.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2760 13bab12d611329d20507d52a5711678f.exe 2760 13bab12d611329d20507d52a5711678f.exe 2760 13bab12d611329d20507d52a5711678f.exe 2760 13bab12d611329d20507d52a5711678f.exe 2760 13bab12d611329d20507d52a5711678f.exe 2760 13bab12d611329d20507d52a5711678f.exe 2760 13bab12d611329d20507d52a5711678f.exe 2760 13bab12d611329d20507d52a5711678f.exe 2760 13bab12d611329d20507d52a5711678f.exe 2760 13bab12d611329d20507d52a5711678f.exe 2760 13bab12d611329d20507d52a5711678f.exe 2760 13bab12d611329d20507d52a5711678f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13bab12d611329d20507d52a5711678f.exe"C:\Users\Admin\AppData\Local\Temp\13bab12d611329d20507d52a5711678f.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760