Analysis
-
max time kernel
0s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2024, 17:59
Behavioral task
behavioral1
Sample
3ea30d166213807059e7bec3f8a946c6.exe
Resource
win7-20231215-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
3ea30d166213807059e7bec3f8a946c6.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
3ea30d166213807059e7bec3f8a946c6.exe
-
Size
672KB
-
MD5
3ea30d166213807059e7bec3f8a946c6
-
SHA1
00c5a7247658a80ebe23594665b5c12633216ea9
-
SHA256
5618afe14e9cba0b7fb2440af72f7cc906df7644ede42d6dab9696a037a61380
-
SHA512
bdb8573d9a332ca9667ec7faa50245ff6daf5a7c60e92e5b6b26371217d8041f9eb1b8d5f77aa56d0ea3f20ebde0a3cdd77e69edbeebf322ffef1d9ba36c8cbb
-
SSDEEP
6144:+uIL4XOrbL8uuOpsPHhhtQDdINgP2iMjz5qBHswNet4KunyRWlpkD5taIA:+7lr07Ys/hhtudFWJIHZNeyKuiW8D
Score
7/10
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3ea30d166213807059e7bec3f8a946c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 3ea30d166213807059e7bec3f8a946c6.exe -
resource yara_rule behavioral2/memory/860-0-0x0000000000400000-0x00000000004DF000-memory.dmp upx behavioral2/memory/860-10-0x0000000000400000-0x00000000004DF000-memory.dmp upx behavioral2/memory/860-8-0x0000000000400000-0x00000000004DF000-memory.dmp upx behavioral2/memory/860-7-0x0000000000400000-0x00000000004DF000-memory.dmp upx behavioral2/memory/860-27-0x0000000000400000-0x00000000004DF000-memory.dmp upx -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA} 3ea30d166213807059e7bec3f8a946c6.exe