Analysis
-
max time kernel
148s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 15:14
Behavioral task
behavioral1
Sample
468cd5264e36e1cf57422654adbee8c1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
468cd5264e36e1cf57422654adbee8c1.exe
Resource
win10v2004-20231222-en
General
-
Target
468cd5264e36e1cf57422654adbee8c1.exe
-
Size
6.9MB
-
MD5
468cd5264e36e1cf57422654adbee8c1
-
SHA1
10690c6d6a3af752b3653e374bd17acea04b0398
-
SHA256
21cc88a1921cee2e32922bb7ac9cc9b94245feff9e6dd80a71aac4b8f6a36251
-
SHA512
848fb46d9e14be6869d4a1ff5170ebaffe417cf2ae4766c0ce900a66a6fc40d4c111f5776c00247fc25f4b31baad43fdff0d1d35b63aa7dadf9af5af5306d010
-
SSDEEP
196608:CyjxfzcW17/FdDGmUSDcM0kltRBhs+9tKZlcVmJC:PNbcW17bGmboM0klH/izcVm
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2240-0-0x0000000000400000-0x0000000001450000-memory.dmp upx behavioral2/memory/2240-12-0x0000000000400000-0x0000000001450000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\U: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\V: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\W: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\A: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\P: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\I: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\R: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\B: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\H: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\K: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\M: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\N: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\O: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\T: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\Y: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\E: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\J: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\S: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\X: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\Z: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\G: 468cd5264e36e1cf57422654adbee8c1.exe File opened (read-only) \??\L: 468cd5264e36e1cf57422654adbee8c1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 468cd5264e36e1cf57422654adbee8c1.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 468cd5264e36e1cf57422654adbee8c1.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS 468cd5264e36e1cf57422654adbee8c1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 468cd5264e36e1cf57422654adbee8c1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName 468cd5264e36e1cf57422654adbee8c1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion 468cd5264e36e1cf57422654adbee8c1.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2240 wrote to memory of 3020 2240 468cd5264e36e1cf57422654adbee8c1.exe 91 PID 2240 wrote to memory of 3020 2240 468cd5264e36e1cf57422654adbee8c1.exe 91 PID 2240 wrote to memory of 3020 2240 468cd5264e36e1cf57422654adbee8c1.exe 91 PID 2240 wrote to memory of 3020 2240 468cd5264e36e1cf57422654adbee8c1.exe 91 PID 2240 wrote to memory of 3020 2240 468cd5264e36e1cf57422654adbee8c1.exe 91 PID 2240 wrote to memory of 3020 2240 468cd5264e36e1cf57422654adbee8c1.exe 91 PID 2240 wrote to memory of 3020 2240 468cd5264e36e1cf57422654adbee8c1.exe 91 PID 2240 wrote to memory of 3020 2240 468cd5264e36e1cf57422654adbee8c1.exe 91 PID 2240 wrote to memory of 3020 2240 468cd5264e36e1cf57422654adbee8c1.exe 91 PID 2240 wrote to memory of 3020 2240 468cd5264e36e1cf57422654adbee8c1.exe 91 PID 2240 wrote to memory of 3020 2240 468cd5264e36e1cf57422654adbee8c1.exe 91 PID 2240 wrote to memory of 3020 2240 468cd5264e36e1cf57422654adbee8c1.exe 91 PID 2240 wrote to memory of 3020 2240 468cd5264e36e1cf57422654adbee8c1.exe 91 PID 2240 wrote to memory of 3020 2240 468cd5264e36e1cf57422654adbee8c1.exe 91 PID 2240 wrote to memory of 3020 2240 468cd5264e36e1cf57422654adbee8c1.exe 91 PID 2240 wrote to memory of 3020 2240 468cd5264e36e1cf57422654adbee8c1.exe 91 PID 2240 wrote to memory of 3020 2240 468cd5264e36e1cf57422654adbee8c1.exe 91 PID 2240 wrote to memory of 3020 2240 468cd5264e36e1cf57422654adbee8c1.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\468cd5264e36e1cf57422654adbee8c1.exe"C:\Users\Admin\AppData\Local\Temp\468cd5264e36e1cf57422654adbee8c1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\468cd5264e36e1cf57422654adbee8c1.exe"C:\Users\Admin\AppData\Local\Temp\468cd5264e36e1cf57422654adbee8c1.exe"2⤵
- Enumerates connected drives
- Checks processor information in registry
- Enumerates system info in registry
PID:3020
-