Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 02:57
Static task
static1
Behavioral task
behavioral1
Sample
738e291258853d87e0d4b24dcb7566ab.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
738e291258853d87e0d4b24dcb7566ab.exe
Resource
win10v2004-20231215-en
General
-
Target
738e291258853d87e0d4b24dcb7566ab.exe
-
Size
565KB
-
MD5
738e291258853d87e0d4b24dcb7566ab
-
SHA1
20a29b1bdaebf9d8d0a98b9acd724812c5330de4
-
SHA256
12d19e794119c621d465ca9f24739b5a679b4109dbf60ddc80aa76d02d74a295
-
SHA512
c26b40e40689d63f052737640186e8f751272e259e5471dcc7f8ff393096bc6ab898629eba566d310bd0dfd0c811455c194a16f076c89170574d38813e366845
-
SSDEEP
12288:c9CYh4DPlf3e42zj7OP/cIilnAT6s9OoX3JqkCPlkHQF0H5xA3txBwtxlH1:NMO24jcIQnAOs9bXZHQFyzgtbwH
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 738e291258853d87e0d4b24dcb7566ab.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 738e291258853d87e0d4b24dcb7566ab.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 738e291258853d87e0d4b24dcb7566ab.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main 738e291258853d87e0d4b24dcb7566ab.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2512 738e291258853d87e0d4b24dcb7566ab.exe 2512 738e291258853d87e0d4b24dcb7566ab.exe 2512 738e291258853d87e0d4b24dcb7566ab.exe 2512 738e291258853d87e0d4b24dcb7566ab.exe 2512 738e291258853d87e0d4b24dcb7566ab.exe 2512 738e291258853d87e0d4b24dcb7566ab.exe 2512 738e291258853d87e0d4b24dcb7566ab.exe 2512 738e291258853d87e0d4b24dcb7566ab.exe 2512 738e291258853d87e0d4b24dcb7566ab.exe 2512 738e291258853d87e0d4b24dcb7566ab.exe 2512 738e291258853d87e0d4b24dcb7566ab.exe 2512 738e291258853d87e0d4b24dcb7566ab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\738e291258853d87e0d4b24dcb7566ab.exe"C:\Users\Admin\AppData\Local\Temp\738e291258853d87e0d4b24dcb7566ab.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2512