Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 06:00
Static task
static1
Behavioral task
behavioral1
Sample
2afa2fb9420c04cd7de490e2b3bb027f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2afa2fb9420c04cd7de490e2b3bb027f.exe
Resource
win10v2004-20231215-en
General
-
Target
2afa2fb9420c04cd7de490e2b3bb027f.exe
-
Size
520KB
-
MD5
2afa2fb9420c04cd7de490e2b3bb027f
-
SHA1
f01ed8b14e4d8d589f1be2e60a0b6905e879d138
-
SHA256
2155d9d006c90ce4c4cdcba48751b0ec2065c3919d7bec0b11f51f92857e7932
-
SHA512
9f26045020e1d47fab50479fef0612246166c883df1d3d3f7b88babf216c292c837ff5638a12fc946d246f64a82f04655ec179bd88f7f444d699673185d86eee
-
SSDEEP
12288:bL7GuyK/RFuWzlbyCCVUVrvet55WaVwzOFd2RnKLbNaQ/CX2xVkNE:vXyidzJynUVc5YaiOGRKXNCuGNE
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2afa2fb9420c04cd7de490e2b3bb027f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2afa2fb9420c04cd7de490e2b3bb027f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 2afa2fb9420c04cd7de490e2b3bb027f.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main 2afa2fb9420c04cd7de490e2b3bb027f.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1216 2afa2fb9420c04cd7de490e2b3bb027f.exe 1216 2afa2fb9420c04cd7de490e2b3bb027f.exe 1216 2afa2fb9420c04cd7de490e2b3bb027f.exe 1216 2afa2fb9420c04cd7de490e2b3bb027f.exe 1216 2afa2fb9420c04cd7de490e2b3bb027f.exe 1216 2afa2fb9420c04cd7de490e2b3bb027f.exe 1216 2afa2fb9420c04cd7de490e2b3bb027f.exe 1216 2afa2fb9420c04cd7de490e2b3bb027f.exe 1216 2afa2fb9420c04cd7de490e2b3bb027f.exe 1216 2afa2fb9420c04cd7de490e2b3bb027f.exe 1216 2afa2fb9420c04cd7de490e2b3bb027f.exe 1216 2afa2fb9420c04cd7de490e2b3bb027f.exe 1216 2afa2fb9420c04cd7de490e2b3bb027f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2afa2fb9420c04cd7de490e2b3bb027f.exe"C:\Users\Admin\AppData\Local\Temp\2afa2fb9420c04cd7de490e2b3bb027f.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1216