Analysis
-
max time kernel
144s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 13:43
Behavioral task
behavioral1
Sample
387d702afc2f944e6c94ce5aea05cfa4.exe
Resource
win7-20231215-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
387d702afc2f944e6c94ce5aea05cfa4.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
387d702afc2f944e6c94ce5aea05cfa4.exe
-
Size
1.5MB
-
MD5
387d702afc2f944e6c94ce5aea05cfa4
-
SHA1
1f5963d400c7994d0ae417bab256aa5629cad37e
-
SHA256
143c3ef12dd6be30aaf1cd9b9fb18b0c827a151b5cfd5c59e2d7d96bff5e0cd5
-
SHA512
7bc9cd95ebdf76ec4c8fe38ac678d2ac0c0bd76b7556daf27729a1dea2ea3d26a964e12900a0ab64fa604d9f2951c67babebf17b8e6708f5859eac61dfb4c84c
-
SSDEEP
49152:l0nTo1wZRrV+R1rvoKEnnqCLupYGOFaXkezPU9jD3Wb6+9U0:l0oiRJ+nDoKEnxLupYGOFaXkezPU9jDG
Score
7/10
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Oem7F7.exe -
Executes dropped EXE 2 IoCs
pid Process 1684 Oem7F7.exe 2540 hhc.exe -
Loads dropped DLL 2 IoCs
pid Process 2460 387d702afc2f944e6c94ce5aea05cfa4.exe 2540 hhc.exe -
resource yara_rule behavioral1/memory/2460-0-0x0000000000400000-0x0000000000764000-memory.dmp upx behavioral1/memory/2460-16-0x0000000000400000-0x0000000000764000-memory.dmp upx behavioral1/memory/2460-41-0x0000000000400000-0x0000000000764000-memory.dmp upx -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\MSBuild\MSDKS hhc.exe File opened for modification C:\Program Files (x86)\MSBuild\MSDKS\MSD.chm hhc.exe File opened for modification C:\Program Files (x86)\MSBuild\MSDKS\GBgz.exe hhc.exe File created C:\Program Files (x86)\MSBuild\MSDKS\GBgz.exe hhc.exe File opened for modification C:\Program Files (x86)\MSBuild hhc.exe File created C:\Program Files (x86)\MSBuild\MSDKS\MSD.chm hhc.exe File opened for modification C:\Program Files (x86)\MSBuild\MSDKS\GBgz.exe.manifest hhc.exe File created C:\Program Files (x86)\MSBuild\MSDKS\GBgz.exe.manifest hhc.exe File opened for modification C:\Program Files (x86)\MSBuild\MSDKS\hha.dll hhc.exe File created C:\Program Files (x86)\MSBuild\MSDKS\hha.dll hhc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2460 387d702afc2f944e6c94ce5aea05cfa4.exe 2460 387d702afc2f944e6c94ce5aea05cfa4.exe 2540 hhc.exe 2540 hhc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1684 Oem7F7.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2460 387d702afc2f944e6c94ce5aea05cfa4.exe Token: SeDebugPrivilege 2460 387d702afc2f944e6c94ce5aea05cfa4.exe Token: SeDebugPrivilege 2540 hhc.exe Token: SeSecurityPrivilege 2540 hhc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2460 387d702afc2f944e6c94ce5aea05cfa4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 1684 2460 387d702afc2f944e6c94ce5aea05cfa4.exe 23 PID 2460 wrote to memory of 1684 2460 387d702afc2f944e6c94ce5aea05cfa4.exe 23 PID 2460 wrote to memory of 1684 2460 387d702afc2f944e6c94ce5aea05cfa4.exe 23 PID 2460 wrote to memory of 1684 2460 387d702afc2f944e6c94ce5aea05cfa4.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\387d702afc2f944e6c94ce5aea05cfa4.exe"C:\Users\Admin\AppData\Local\Temp\387d702afc2f944e6c94ce5aea05cfa4.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\¼¤»î¹¤¾ß\Oem7F7.exeC:\Users\Admin\AppData\Local\Temp\¼¤»î¹¤¾ß\Oem7F7.exe2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:1684
-
-
C:\Windows\Temp\unist000\hhc.exe"C:\Windows\Temp\unist000\hhc.exe" font1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2540