Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-01-2024 15:46
Behavioral task
behavioral1
Sample
68031b26b1507b550c923270ee91cfe7.exe
Resource
win7-20231215-en
General
-
Target
68031b26b1507b550c923270ee91cfe7.exe
-
Size
680KB
-
MD5
68031b26b1507b550c923270ee91cfe7
-
SHA1
986411863d66a3b974f63bf621974b04f28ee599
-
SHA256
0654ce7788469cb30c2c390d0fe6f9dc2c85ef6f6b1ab4cdffcd84ecd99370e3
-
SHA512
0a04071aaeac68a8bc3672d99e4144373f79a3626d4a769a0ef22b8311359700cea8676763c462ccaad064948d0640f7dbf6e1764f9e603b0077e5687c2a2e75
-
SSDEEP
12288:hutqaqHK6De/aTENO5H7r39UcE0s/32wVyYMyR/o5TxCAFjKivEE06d/:+Vz6OA5H7r3K5n2xY/R/CTQ+jKFExV
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 68031b26b1507b550c923270ee91cfe7.exe -
resource yara_rule behavioral1/memory/2268-0-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2268-22-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2268-23-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2268-24-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2268-25-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/2268-26-0x0000000000400000-0x00000000005CC000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 68031b26b1507b550c923270ee91cfe7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 68031b26b1507b550c923270ee91cfe7.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main 68031b26b1507b550c923270ee91cfe7.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2268 68031b26b1507b550c923270ee91cfe7.exe 2268 68031b26b1507b550c923270ee91cfe7.exe 2268 68031b26b1507b550c923270ee91cfe7.exe 2268 68031b26b1507b550c923270ee91cfe7.exe 2268 68031b26b1507b550c923270ee91cfe7.exe 2268 68031b26b1507b550c923270ee91cfe7.exe 2268 68031b26b1507b550c923270ee91cfe7.exe 2268 68031b26b1507b550c923270ee91cfe7.exe 2268 68031b26b1507b550c923270ee91cfe7.exe 2268 68031b26b1507b550c923270ee91cfe7.exe 2268 68031b26b1507b550c923270ee91cfe7.exe 2268 68031b26b1507b550c923270ee91cfe7.exe 2268 68031b26b1507b550c923270ee91cfe7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68031b26b1507b550c923270ee91cfe7.exe"C:\Users\Admin\AppData\Local\Temp\68031b26b1507b550c923270ee91cfe7.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2268