Analysis
-
max time kernel
119s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 06:46
Behavioral task
behavioral1
Sample
2c275624fcfef6e092ce87e6c7d4be9a.exe
Resource
win7-20231215-en
General
-
Target
2c275624fcfef6e092ce87e6c7d4be9a.exe
-
Size
678KB
-
MD5
2c275624fcfef6e092ce87e6c7d4be9a
-
SHA1
57e39b201af181f0e9869ed02cdb536780920889
-
SHA256
14712c8be3c1ea24d10b06a07d986bb23c51baf238a5c85f1cc2c0badfeb1862
-
SHA512
7a271a501f9edbaafa618324baaf64313d13693ed78d2fb56c14938140793395a8d801e1ce6ffecf11d3cdc0756a6e50b9df9f3dc19de9749300a954d81a849e
-
SSDEEP
12288:tQ+8YcSdcdp7GqDd7o4YINDz6/AAgYShiuFfIihBtwVabCMUA4+6vlF7Y:7iSmrpDd75d68hiuF5H8abCMUN+YlFc
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2c275624fcfef6e092ce87e6c7d4be9a.exe -
resource yara_rule behavioral1/memory/1904-0-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1904-22-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1904-23-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1904-24-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1904-25-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1904-26-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1904-27-0x0000000000400000-0x00000000005CC000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2c275624fcfef6e092ce87e6c7d4be9a.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 2c275624fcfef6e092ce87e6c7d4be9a.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main 2c275624fcfef6e092ce87e6c7d4be9a.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1904 2c275624fcfef6e092ce87e6c7d4be9a.exe 1904 2c275624fcfef6e092ce87e6c7d4be9a.exe 1904 2c275624fcfef6e092ce87e6c7d4be9a.exe 1904 2c275624fcfef6e092ce87e6c7d4be9a.exe 1904 2c275624fcfef6e092ce87e6c7d4be9a.exe 1904 2c275624fcfef6e092ce87e6c7d4be9a.exe 1904 2c275624fcfef6e092ce87e6c7d4be9a.exe 1904 2c275624fcfef6e092ce87e6c7d4be9a.exe 1904 2c275624fcfef6e092ce87e6c7d4be9a.exe 1904 2c275624fcfef6e092ce87e6c7d4be9a.exe 1904 2c275624fcfef6e092ce87e6c7d4be9a.exe 1904 2c275624fcfef6e092ce87e6c7d4be9a.exe 1904 2c275624fcfef6e092ce87e6c7d4be9a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c275624fcfef6e092ce87e6c7d4be9a.exe"C:\Users\Admin\AppData\Local\Temp\2c275624fcfef6e092ce87e6c7d4be9a.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1904