Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 07:59
Behavioral task
behavioral1
Sample
50039c5c1ddf1adfe3ee4cb11332bf70.exe
Resource
win7-20231215-en
General
-
Target
50039c5c1ddf1adfe3ee4cb11332bf70.exe
-
Size
666KB
-
MD5
50039c5c1ddf1adfe3ee4cb11332bf70
-
SHA1
e169d709b1275419736035bc66ac2ff5e1359ea6
-
SHA256
213c51fe725536ddf49bec4716bec26f7f09700a052ae56b305d783ecbbfd349
-
SHA512
345800d6dbbab06e9499e0fa330947293bc9adc892064ad6ae4ca3acf81aae8d2794320cce74bee2180ab484e43955f6a112cf5ed20c60528221460dcc136e89
-
SSDEEP
12288:TuICix5biGGkpfJaQRLWpxeTMb3LGr3t0aX/pShgQwM7TwXwodf3nut:TJCKVkQR0eTMb3LGr3lXIhxwiUwcfnut
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 50039c5c1ddf1adfe3ee4cb11332bf70.exe -
resource yara_rule behavioral1/memory/2240-0-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2240-22-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2240-23-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2240-24-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2240-25-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2240-26-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2240-27-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral1/memory/2240-28-0x0000000000400000-0x00000000005C7000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 50039c5c1ddf1adfe3ee4cb11332bf70.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 50039c5c1ddf1adfe3ee4cb11332bf70.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main 50039c5c1ddf1adfe3ee4cb11332bf70.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2240 50039c5c1ddf1adfe3ee4cb11332bf70.exe 2240 50039c5c1ddf1adfe3ee4cb11332bf70.exe 2240 50039c5c1ddf1adfe3ee4cb11332bf70.exe 2240 50039c5c1ddf1adfe3ee4cb11332bf70.exe 2240 50039c5c1ddf1adfe3ee4cb11332bf70.exe 2240 50039c5c1ddf1adfe3ee4cb11332bf70.exe 2240 50039c5c1ddf1adfe3ee4cb11332bf70.exe 2240 50039c5c1ddf1adfe3ee4cb11332bf70.exe 2240 50039c5c1ddf1adfe3ee4cb11332bf70.exe 2240 50039c5c1ddf1adfe3ee4cb11332bf70.exe 2240 50039c5c1ddf1adfe3ee4cb11332bf70.exe 2240 50039c5c1ddf1adfe3ee4cb11332bf70.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50039c5c1ddf1adfe3ee4cb11332bf70.exe"C:\Users\Admin\AppData\Local\Temp\50039c5c1ddf1adfe3ee4cb11332bf70.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240