Analysis
-
max time kernel
118s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 01:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7bbf8ede58e4b887d5e6b56ed6f77c32.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
7bbf8ede58e4b887d5e6b56ed6f77c32.exe
Resource
win10v2004-20231222-en
5 signatures
150 seconds
General
-
Target
7bbf8ede58e4b887d5e6b56ed6f77c32.exe
-
Size
1.1MB
-
MD5
7bbf8ede58e4b887d5e6b56ed6f77c32
-
SHA1
515fbc69d365a551cad298c97f193903262b0d03
-
SHA256
c1b9b2a1097d555559c6846f626c647d2299a290ef8e81db85db7f8df192335f
-
SHA512
0451b465c7a41d950cd1c4dc06ee2e4f9d7c9ec955c83ef9492f5da74b993d870db6f1a3a8ae5b9a22b884ca78602d8feb4ffe3578900d72c880f9eadd6d77e6
-
SSDEEP
24576:iIj6LrTQlLga5oYsTrOqiiX2xaMrEo1WncPE:k65XsTj2MMrN0oE
Score
7/10
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7bbf8ede58e4b887d5e6b56ed6f77c32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 7bbf8ede58e4b887d5e6b56ed6f77c32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7E0F3F10-7B69-8C21-EE01-70DABCF57934}\InprocServer32\Assembly = "Microsoft.Vbe.Interop, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" 7bbf8ede58e4b887d5e6b56ed6f77c32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7E0F3F10-7B69-8C21-EE01-70DABCF57934}\InprocServer32\Class = "Microsoft.Vbe.Interop.VBProjectClass" 7bbf8ede58e4b887d5e6b56ed6f77c32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7E0F3F10-7B69-8C21-EE01-70DABCF57934}\InprocServer32\14.0.0.0 7bbf8ede58e4b887d5e6b56ed6f77c32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7E0F3F10-7B69-8C21-EE01-70DABCF57934} 7bbf8ede58e4b887d5e6b56ed6f77c32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7E0F3F10-7B69-8C21-EE01-70DABCF57934}\InprocServer32 7bbf8ede58e4b887d5e6b56ed6f77c32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7E0F3F10-7B69-8C21-EE01-70DABCF57934}\InprocServer32\RuntimeVersion = "v2.0.50727" 7bbf8ede58e4b887d5e6b56ed6f77c32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7E0F3F10-7B69-8C21-EE01-70DABCF57934}\InprocServer32\14.0.0.0\Assembly = "Microsoft.Vbe.Interop, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" 7bbf8ede58e4b887d5e6b56ed6f77c32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7E0F3F10-7B69-8C21-EE01-70DABCF57934}\InprocServer32\14.0.0.0\Class = "Microsoft.Vbe.Interop.VBProjectClass" 7bbf8ede58e4b887d5e6b56ed6f77c32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7E0F3F10-7B69-8C21-EE01-70DABCF57934}\InprocServer32\14.0.0.0\RuntimeVersion = "v2.0.50727" 7bbf8ede58e4b887d5e6b56ed6f77c32.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\ProgramData\TEMP:BF14D50A 7bbf8ede58e4b887d5e6b56ed6f77c32.exe File opened for modification C:\ProgramData\TEMP:BF14D50A 7bbf8ede58e4b887d5e6b56ed6f77c32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 3064 7bbf8ede58e4b887d5e6b56ed6f77c32.exe Token: SeIncBasePriorityPrivilege 3064 7bbf8ede58e4b887d5e6b56ed6f77c32.exe Token: 33 3064 7bbf8ede58e4b887d5e6b56ed6f77c32.exe Token: SeIncBasePriorityPrivilege 3064 7bbf8ede58e4b887d5e6b56ed6f77c32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1972 wrote to memory of 3064 1972 7bbf8ede58e4b887d5e6b56ed6f77c32.exe 27 PID 1972 wrote to memory of 3064 1972 7bbf8ede58e4b887d5e6b56ed6f77c32.exe 27 PID 1972 wrote to memory of 3064 1972 7bbf8ede58e4b887d5e6b56ed6f77c32.exe 27 PID 1972 wrote to memory of 3064 1972 7bbf8ede58e4b887d5e6b56ed6f77c32.exe 27 PID 1972 wrote to memory of 3064 1972 7bbf8ede58e4b887d5e6b56ed6f77c32.exe 27 PID 1972 wrote to memory of 3064 1972 7bbf8ede58e4b887d5e6b56ed6f77c32.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bbf8ede58e4b887d5e6b56ed6f77c32.exe"C:\Users\Admin\AppData\Local\Temp\7bbf8ede58e4b887d5e6b56ed6f77c32.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\7bbf8ede58e4b887d5e6b56ed6f77c32.exe"C:\Users\Admin\AppData\Local\Temp\7bbf8ede58e4b887d5e6b56ed6f77c32.exe"2⤵
- Checks BIOS information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:3064
-