Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 14:42
Static task
static1
Behavioral task
behavioral1
Sample
b4f3468f92b9d34f5214cf3095fa1049.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4f3468f92b9d34f5214cf3095fa1049.exe
Resource
win10v2004-20240226-en
General
-
Target
b4f3468f92b9d34f5214cf3095fa1049.exe
-
Size
586KB
-
MD5
b4f3468f92b9d34f5214cf3095fa1049
-
SHA1
5d93698c086f958efa8066c53c2a403246c6d444
-
SHA256
14803d738ab40c019f8976c4ae4185bea07a0714c9b3108401aea688341955d6
-
SHA512
0a885bbe5e3b31d95c3ff174a02ff65486bc40e9d4465aea4db109e0da0b4fab7a06a53abf257abba5858f851e62bbe5c9ae1e6b17a6d26422cd75682a514827
-
SSDEEP
12288:TBaDBRbn4Xw5I0nVMn2mqHeIHf4dR4e4kUD3eUG00DUJcR3rBED90ZRO8sF:UDB94XQVesDyRD4kUD3eUG00DUJcNrid
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b4f3468f92b9d34f5214cf3095fa1049.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b4f3468f92b9d34f5214cf3095fa1049.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b4f3468f92b9d34f5214cf3095fa1049.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b4f3468f92b9d34f5214cf3095fa1049.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 b4f3468f92b9d34f5214cf3095fa1049.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b4f3468f92b9d34f5214cf3095fa1049.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 b4f3468f92b9d34f5214cf3095fa1049.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1704 set thread context of 2632 1704 b4f3468f92b9d34f5214cf3095fa1049.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main b4f3468f92b9d34f5214cf3095fa1049.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2632 b4f3468f92b9d34f5214cf3095fa1049.exe 2632 b4f3468f92b9d34f5214cf3095fa1049.exe 2632 b4f3468f92b9d34f5214cf3095fa1049.exe 2632 b4f3468f92b9d34f5214cf3095fa1049.exe 2632 b4f3468f92b9d34f5214cf3095fa1049.exe 2632 b4f3468f92b9d34f5214cf3095fa1049.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2632 1704 b4f3468f92b9d34f5214cf3095fa1049.exe 29 PID 1704 wrote to memory of 2632 1704 b4f3468f92b9d34f5214cf3095fa1049.exe 29 PID 1704 wrote to memory of 2632 1704 b4f3468f92b9d34f5214cf3095fa1049.exe 29 PID 1704 wrote to memory of 2632 1704 b4f3468f92b9d34f5214cf3095fa1049.exe 29 PID 1704 wrote to memory of 2632 1704 b4f3468f92b9d34f5214cf3095fa1049.exe 29 PID 1704 wrote to memory of 2632 1704 b4f3468f92b9d34f5214cf3095fa1049.exe 29 PID 1704 wrote to memory of 2632 1704 b4f3468f92b9d34f5214cf3095fa1049.exe 29 PID 1704 wrote to memory of 2632 1704 b4f3468f92b9d34f5214cf3095fa1049.exe 29 PID 1704 wrote to memory of 2632 1704 b4f3468f92b9d34f5214cf3095fa1049.exe 29 PID 1704 wrote to memory of 2632 1704 b4f3468f92b9d34f5214cf3095fa1049.exe 29 PID 1704 wrote to memory of 2632 1704 b4f3468f92b9d34f5214cf3095fa1049.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4f3468f92b9d34f5214cf3095fa1049.exe"C:\Users\Admin\AppData\Local\Temp\b4f3468f92b9d34f5214cf3095fa1049.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\b4f3468f92b9d34f5214cf3095fa1049.exe"C:\Users\Admin\AppData\Local\Temp\b4f3468f92b9d34f5214cf3095fa1049.exe" Track="0001001000"2⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
-