Analysis
-
max time kernel
148s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 05:10
Static task
static1
Behavioral task
behavioral1
Sample
c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe
Resource
win10v2004-20231215-en
General
-
Target
c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe
-
Size
4.4MB
-
MD5
9631809ff9e66cc5809e51e2929dfbe8
-
SHA1
4ee1085393d94978fc17b1453517f0aa7f40b8a3
-
SHA256
c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583
-
SHA512
3e350e41e7a86756438762c0a6772e5781757bb941e8c88c58238e1f19e15a3eb743301119050b30476d69bc68568a0bad1cdd4560f1ecac2cf4c0c72c9d77d1
-
SSDEEP
98304:k8sjkFhRWieWT0ywsagZ9VeXD3qJJXg2cMUGZWh:2jyhRPeWvnzwrivWh
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral2/files/0x0006000000023207-6.dat UPX behavioral2/files/0x0006000000023207-7.dat UPX behavioral2/memory/956-8-0x0000000000400000-0x0000000000623000-memory.dmp UPX behavioral2/memory/956-71-0x0000000000400000-0x0000000000623000-memory.dmp UPX -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsLoader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WindowsLoader.exe -
Executes dropped EXE 1 IoCs
pid Process 956 WindowsLoader.exe -
resource yara_rule behavioral2/files/0x0006000000023207-6.dat upx behavioral2/files/0x0006000000023207-7.dat upx behavioral2/memory/956-8-0x0000000000400000-0x0000000000623000-memory.dmp upx behavioral2/memory/956-71-0x0000000000400000-0x0000000000623000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS WindowsLoader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct WindowsLoader.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 956 WindowsLoader.exe 956 WindowsLoader.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 956 WindowsLoader.exe Token: SeIncBasePriorityPrivilege 956 WindowsLoader.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 956 WindowsLoader.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1532 wrote to memory of 956 1532 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 84 PID 1532 wrote to memory of 956 1532 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 84 PID 1532 wrote to memory of 956 1532 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe"C:\Users\Admin\AppData\Local\Temp\c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\WindowsLoader.exeC:\Users\Admin\AppData\Local\Temp\WindowsLoader.exe2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5b8bb5b4bb8d0948eade0cdf12c16f5b6
SHA103f8413f2eeffcb4144bcb6fa60a2d1a2dc2b4ce
SHA2568ef25e4ab7cce321c3a37a56c22297c55963d10f34ad3f2a494e7a220e6294dd
SHA5125e461682c20ee2c9b6329780fd434088febdf34d040d7f616076fc7f1f9f75a3789054f5b916a34c94339714bdebd5194e2828be5451cd6a04fea58e681120b6
-
Filesize
1.6MB
MD518a6a126d56739fd4e5ea87f19f749b0
SHA149acbf6a7b26d9deeef3c9935aa5c6a701bdb51c
SHA2569340c64f90f0c8cec0120ebfc4d3b826fc58446177492531353572b34229b80a
SHA512fcb0e82d39df186d325391e9444a1dc48607c4c0a570669a8feaef7cf87bf00ab8e3ea0ef516322eb0767407f90962e392e2c73a94adf1a9af7a6a5e282c368a