Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:06
Behavioral task
behavioral1
Sample
155997b350f2392e0e56f69477749570.exe
Resource
win7-20231215-en
General
-
Target
155997b350f2392e0e56f69477749570.exe
-
Size
666KB
-
MD5
155997b350f2392e0e56f69477749570
-
SHA1
e409f1ab443c02b8d3e4495b00bcf06bb73e106e
-
SHA256
a797f4cb9197e7a2803522ee94ae5c6af5773db64e7bce70177ebfe80d1af968
-
SHA512
5f6cdc501e65668c8bac911446612033998c407b88edbe876a3cb0f6b872d327fb0386b90da794fb2a1390a67f107a7944a1bf4d192cef14d4722276e459892e
-
SSDEEP
12288:SbDqEkMs4q48IAeP0PifTEurPbvdqJplapLWTICNIYPKMTWN4t4OAUw91zRwIMf8:SXbs48LeP0P8E6dclWLi26KGOqMwIM
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 155997b350f2392e0e56f69477749570.exe -
resource yara_rule behavioral1/memory/2380-0-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2380-28-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2380-29-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2380-30-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2380-31-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2380-32-0x0000000000400000-0x00000000005C7000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 155997b350f2392e0e56f69477749570.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 155997b350f2392e0e56f69477749570.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main 155997b350f2392e0e56f69477749570.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2380 155997b350f2392e0e56f69477749570.exe 2380 155997b350f2392e0e56f69477749570.exe 2380 155997b350f2392e0e56f69477749570.exe 2380 155997b350f2392e0e56f69477749570.exe 2380 155997b350f2392e0e56f69477749570.exe 2380 155997b350f2392e0e56f69477749570.exe 2380 155997b350f2392e0e56f69477749570.exe 2380 155997b350f2392e0e56f69477749570.exe 2380 155997b350f2392e0e56f69477749570.exe 2380 155997b350f2392e0e56f69477749570.exe 2380 155997b350f2392e0e56f69477749570.exe 2380 155997b350f2392e0e56f69477749570.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\155997b350f2392e0e56f69477749570.exe"C:\Users\Admin\AppData\Local\Temp\155997b350f2392e0e56f69477749570.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380