Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 14:39
Behavioral task
behavioral1
Sample
3a17e2fafd1b3cb9ce9a737ece577e5f.exe
Resource
win7-20231215-en
General
-
Target
3a17e2fafd1b3cb9ce9a737ece577e5f.exe
-
Size
678KB
-
MD5
3a17e2fafd1b3cb9ce9a737ece577e5f
-
SHA1
86bd859e6898a3c78274c8ff428836b0dcd80875
-
SHA256
108ca88aa1b5ae9e67f721c6aa1533513f3240af13d16221f79ec24c49fd98da
-
SHA512
e2c4ba0f6c75df1e3ba26a6a2ea59034a7eb8dd8c889190b3b3ac5d02c099ce066fd4678dca51b671bcc8bf64e396e3a392ec4e0f434d5311d1da02c45021d3d
-
SSDEEP
12288:CQ+8YcSdcdp7GqDd7o4YINDz6/AAgYShiuFfIihBtwVabCMUA4+6vlF7:2iSmrpDd75d68hiuF5H8abCMUN+YlF
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3a17e2fafd1b3cb9ce9a737ece577e5f.exe -
resource yara_rule behavioral1/memory/2120-0-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2120-22-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2120-23-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2120-24-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2120-25-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2120-26-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2120-27-0x0000000000400000-0x00000000005CC000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 3a17e2fafd1b3cb9ce9a737ece577e5f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 3a17e2fafd1b3cb9ce9a737ece577e5f.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main 3a17e2fafd1b3cb9ce9a737ece577e5f.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2120 3a17e2fafd1b3cb9ce9a737ece577e5f.exe 2120 3a17e2fafd1b3cb9ce9a737ece577e5f.exe 2120 3a17e2fafd1b3cb9ce9a737ece577e5f.exe 2120 3a17e2fafd1b3cb9ce9a737ece577e5f.exe 2120 3a17e2fafd1b3cb9ce9a737ece577e5f.exe 2120 3a17e2fafd1b3cb9ce9a737ece577e5f.exe 2120 3a17e2fafd1b3cb9ce9a737ece577e5f.exe 2120 3a17e2fafd1b3cb9ce9a737ece577e5f.exe 2120 3a17e2fafd1b3cb9ce9a737ece577e5f.exe 2120 3a17e2fafd1b3cb9ce9a737ece577e5f.exe 2120 3a17e2fafd1b3cb9ce9a737ece577e5f.exe 2120 3a17e2fafd1b3cb9ce9a737ece577e5f.exe 2120 3a17e2fafd1b3cb9ce9a737ece577e5f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a17e2fafd1b3cb9ce9a737ece577e5f.exe"C:\Users\Admin\AppData\Local\Temp\3a17e2fafd1b3cb9ce9a737ece577e5f.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120