Overview
overview
7Static
static
3SmartDataR...en.exe
windows7-x64
1SmartDataR...en.exe
windows10-2004-x64
1SmartDataR...ry.chm
windows7-x64
1SmartDataR...ry.chm
windows10-2004-x64
1SmartDataR...ry.dll
windows7-x64
1SmartDataR...ry.dll
windows10-2004-x64
1SmartDataR...ry.exe
windows7-x64
7SmartDataR...ry.exe
windows10-2004-x64
7SmartDataR...��.url
windows7-x64
1SmartDataR...��.url
windows10-2004-x64
1Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 11:38
Static task
static1
Behavioral task
behavioral1
Sample
SmartDataRecovery/Keygen.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
SmartDataRecovery/Keygen.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
SmartDataRecovery/SmartDataRecovery.chm
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
SmartDataRecovery/SmartDataRecovery.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
SmartDataRecovery/SmartDataRecovery.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
SmartDataRecovery/SmartDataRecovery.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
SmartDataRecovery/SmartDataRecovery.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
SmartDataRecovery/SmartDataRecovery.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
SmartDataRecovery/新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
SmartDataRecovery/新云软件.url
Resource
win10v2004-20231215-en
General
-
Target
SmartDataRecovery/SmartDataRecovery.exe
-
Size
1.9MB
-
MD5
3e9d5447c48c1253b4f60f04aef511b8
-
SHA1
72507bf4c429d4bdee5c38f7dcadb444e329821d
-
SHA256
253a2162e3b5eb6984f9b36982b3d5ff6e90f6b7333e3403b2560186bbd13eaf
-
SHA512
9e0bc97584f9afd11f34d05bf95886bf3dbfc28159245a1e031847ec378f270e2197b843db004d83573aeeac6204940e6ac6fd9a918fc381fd78c5347908be1e
-
SSDEEP
49152:TJyyM1fGVBjFzv/xs2/jdALlU19A4FnS:TJxEGVzHxF7klUPS
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SmartDataRecovery.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate SmartDataRecovery.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8EC62A16-605E-2189-E47B-06576519ABCF}\InprocServer32\RuntimeVersion = "v2.0.50727" SmartDataRecovery.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8EC62A16-605E-2189-E47B-06576519ABCF}\InprocServer32\14.0.0.0 SmartDataRecovery.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8EC62A16-605E-2189-E47B-06576519ABCF}\InprocServer32\14.0.0.0\Assembly = "Microsoft.Office.Interop.Access, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" SmartDataRecovery.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8EC62A16-605E-2189-E47B-06576519ABCF}\InprocServer32\14.0.0.0\Class = "Microsoft.Office.Interop.Access.AllFunctionsClass" SmartDataRecovery.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8EC62A16-605E-2189-E47B-06576519ABCF}\InprocServer32\14.0.0.0\RuntimeVersion = "v2.0.50727" SmartDataRecovery.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8EC62A16-605E-2189-E47B-06576519ABCF} SmartDataRecovery.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8EC62A16-605E-2189-E47B-06576519ABCF}\InprocServer32 SmartDataRecovery.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8EC62A16-605E-2189-E47B-06576519ABCF}\InprocServer32\Assembly = "Microsoft.Office.Interop.Access, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" SmartDataRecovery.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8EC62A16-605E-2189-E47B-06576519ABCF}\InprocServer32\Class = "Microsoft.Office.Interop.Access.AllFunctionsClass" SmartDataRecovery.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2492 SmartDataRecovery.exe Token: SeIncBasePriorityPrivilege 2492 SmartDataRecovery.exe