Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 06:23
Behavioral task
behavioral1
Sample
2b9c15a343340fa11157fe11228d8597.exe
Resource
win7-20231215-en
General
-
Target
2b9c15a343340fa11157fe11228d8597.exe
-
Size
679KB
-
MD5
2b9c15a343340fa11157fe11228d8597
-
SHA1
430f4606ab383e2954e3d2e1b24c5d474b01c6b3
-
SHA256
0693ea32929e16244f75a3744e25f61b50ee4454c81b2763188adc9c3f53b006
-
SHA512
9d8ca876e5906859dff55d20274927abcbb46460ee1f0cafbd0c5c2e51e85674de1b053c2e63bbdda711b15bc60aead1955af9d4cb716d9b096dfa438f0b3d37
-
SSDEEP
12288:/Q+8YcSdcdp7GqDd7o4YINDz6/AAgYShiuFfIihBtwVabCMUA4+6vlF7r:diSmrpDd75d68hiuF5H8abCMUN+YlFf
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2b9c15a343340fa11157fe11228d8597.exe -
resource yara_rule behavioral1/memory/308-0-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/308-25-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/308-26-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/308-27-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/308-28-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/308-29-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/308-30-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/308-31-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/308-32-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/308-33-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/308-34-0x0000000000400000-0x00000000005CC000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2b9c15a343340fa11157fe11228d8597.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 2b9c15a343340fa11157fe11228d8597.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main 2b9c15a343340fa11157fe11228d8597.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 308 2b9c15a343340fa11157fe11228d8597.exe 308 2b9c15a343340fa11157fe11228d8597.exe 308 2b9c15a343340fa11157fe11228d8597.exe 308 2b9c15a343340fa11157fe11228d8597.exe 308 2b9c15a343340fa11157fe11228d8597.exe 308 2b9c15a343340fa11157fe11228d8597.exe 308 2b9c15a343340fa11157fe11228d8597.exe 308 2b9c15a343340fa11157fe11228d8597.exe 308 2b9c15a343340fa11157fe11228d8597.exe 308 2b9c15a343340fa11157fe11228d8597.exe 308 2b9c15a343340fa11157fe11228d8597.exe 308 2b9c15a343340fa11157fe11228d8597.exe 308 2b9c15a343340fa11157fe11228d8597.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b9c15a343340fa11157fe11228d8597.exe"C:\Users\Admin\AppData\Local\Temp\2b9c15a343340fa11157fe11228d8597.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:308