Analysis
-
max time kernel
136s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 09:43
Static task
static1
Behavioral task
behavioral1
Sample
8c0221a00cd0cea264fb6a5aa8193b28.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8c0221a00cd0cea264fb6a5aa8193b28.exe
Resource
win10v2004-20231215-en
General
-
Target
8c0221a00cd0cea264fb6a5aa8193b28.exe
-
Size
60KB
-
MD5
8c0221a00cd0cea264fb6a5aa8193b28
-
SHA1
9cff4a59a3dd66bc87813e3833b1030760d59a7d
-
SHA256
d6b1f8390369494c29af4fc33bfae96964c313f9a84de8c39576143d4fe3f285
-
SHA512
2c071215949bec6f463c4b6d194903e963f19b8b6dd6c7fd848a2f3798ab339ce9f6ed8e90d1b915bd73d2bf8655aa5f4b52e458a1b4c9de2cc7461ba19469ce
-
SSDEEP
768:9MMZ90SFCgpNFIxm3YMCbQXFnlWoFBdWKsKJLVClUc9hJaBOfYbIcXXEikEOuLlf:9MgDFPWgYMC0BXdzsZU4hSMYXCwle
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 8c0221a00cd0cea264fb6a5aa8193b28.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8c0221a00cd0cea264fb6a5aa8193b28.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz 8c0221a00cd0cea264fb6a5aa8193b28.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosDate 8c0221a00cd0cea264fb6a5aa8193b28.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\New Windows\Allow 8c0221a00cd0cea264fb6a5aa8193b28.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\New Windows\Allow\*.starsdoor.com 8c0221a00cd0cea264fb6a5aa8193b28.exe -
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\Wow6432Node\CLSID\{241CE3F5-0BB8-1033-0401-1401140001}\Param1 = "MTMzNTE0MjA4MDAwMDAwMDAw" 8c0221a00cd0cea264fb6a5aa8193b28.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\Wow6432Node\CLSID\{241CE3F5-0BB8-1033-0401-1401140001} 8c0221a00cd0cea264fb6a5aa8193b28.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\Wow6432Node 8c0221a00cd0cea264fb6a5aa8193b28.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\Wow6432Node\CLSID 8c0221a00cd0cea264fb6a5aa8193b28.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\Wow6432Node\CLSID\{241CE3F5-0BB8-1033-0401-1401140001}\Param3 = "MTA=" 8c0221a00cd0cea264fb6a5aa8193b28.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\Wow6432Node\CLSID\{241CE3F5-0BB8-1033-0401-1401140001}\Param4 = "MzAw" 8c0221a00cd0cea264fb6a5aa8193b28.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\Wow6432Node\CLSID\{241CE3F5-0BB8-1033-0401-1401140001}\Param2 = "MA==" 8c0221a00cd0cea264fb6a5aa8193b28.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c0221a00cd0cea264fb6a5aa8193b28.exe"C:\Users\Admin\AppData\Local\Temp\8c0221a00cd0cea264fb6a5aa8193b28.exe"1⤵
- Checks BIOS information in registry
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
PID:1308