Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2024, 21:34
Behavioral task
behavioral1
Sample
aa355413985bc737c72a81e5a1ac3462.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa355413985bc737c72a81e5a1ac3462.exe
Resource
win10v2004-20240226-en
General
-
Target
aa355413985bc737c72a81e5a1ac3462.exe
-
Size
103KB
-
MD5
aa355413985bc737c72a81e5a1ac3462
-
SHA1
93727fd34a0d1532d9a9484ac9c45236341076b5
-
SHA256
f666d62caa4b2e9fbf66f4657b6b7740b190e858650c2bbe21d79dfc2126b1d0
-
SHA512
e01f2fbdbc5c64f0654e1ffba50e56aca0c9341be7c1bba11345de0aa73cced522701c8f1079c7acb7b426798b8428c73e32f2fbcbadb517a79d570174b92e3d
-
SSDEEP
1536:xRudF3lmBboCuezR8Iq6FQoTWIsmaxH0uI/JFeDMDh40O2CcqIMzqCkSlDFw0Rp+:X6lmBZuw8IqyQoK/7l0lB3qImDrf3M
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aa355413985bc737c72a81e5a1ac3462.exe -
resource yara_rule behavioral2/memory/5040-0-0x0000000000400000-0x0000000000461000-memory.dmp upx behavioral2/memory/5040-1-0x0000000000400000-0x0000000000461000-memory.dmp upx -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 aa355413985bc737c72a81e5a1ac3462.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier aa355413985bc737c72a81e5a1ac3462.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5040 aa355413985bc737c72a81e5a1ac3462.exe