Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 09:47
Behavioral task
behavioral1
Sample
532fdb215e51176bd9e15d4a0680293d.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
532fdb215e51176bd9e15d4a0680293d.exe
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
532fdb215e51176bd9e15d4a0680293d.exe
-
Size
28KB
-
MD5
532fdb215e51176bd9e15d4a0680293d
-
SHA1
b35d8beb5061f86b0df7ac84a77183d50d1ce735
-
SHA256
1315bc3354798174369f220703f3c90591720cdaa3135d2b4fa029f80d5d4998
-
SHA512
82ccb71d34b33f9e924f33baeb8d3927452a1d13243afc71f08c1abf59ef098d0a4a323ce465d1bbb4b01bdc6f58ade57717459dbb936296ee880bf4e9aaa9db
-
SSDEEP
768:zEap30hslvD5ooHA9HE+3h7jym+Z+SgIvrqLQq23gswq23gsmq23gsK:zpp30h+D6oHACmBym+TfeMe
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 532fdb215e51176bd9e15d4a0680293d.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\532fdb215e51176bd9e15d4a0680293d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\532fdb215e51176bd9e15d4a0680293d.exe:*:Enabled:ldrsoft" 532fdb215e51176bd9e15d4a0680293d.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 532fdb215e51176bd9e15d4a0680293d.exe -
resource yara_rule behavioral1/memory/1964-2-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral1/memory/1964-1-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral1/memory/1964-0-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral1/memory/1964-3-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral1/memory/1964-8-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral1/memory/1964-12-0x0000000000400000-0x000000000056A000-memory.dmp upx behavioral1/memory/1964-16-0x0000000000400000-0x000000000056A000-memory.dmp upx