Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 02:25
Behavioral task
behavioral1
Sample
ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe
Resource
win7-20240221-en
General
-
Target
ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe
-
Size
680KB
-
MD5
ca3f8a4f7aa7c3ada864f75afdf7f2ea
-
SHA1
438e89d7fd3f02e67696b980aa204f3343d47cbc
-
SHA256
1178938462e3258bef497f6908edaf58798169e6a39672443be1ba678e95f1f6
-
SHA512
cb2a595d43dae94e58b28f66cc2907ef53246bbd797e6a340a7ffb01c13255dbfdbacd15e52e212167b0b7b90dd538c2652e2425553578fee1f9ee3f85eceb7a
-
SSDEEP
12288:8wEZxZLDznQwo5unUeArTE5yjgcy7LxOuH9/7HPuXRZ8dzfPtfdeEvnrvdXZPThd:rEZxZLHnQwOunXLpvwuVbKz81VfTFXZH
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe -
resource yara_rule behavioral1/memory/1756-0-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1756-28-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1756-29-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1756-30-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1756-31-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral1/memory/1756-32-0x0000000000400000-0x00000000005CC000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1756 ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe 1756 ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe 1756 ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe 1756 ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe 1756 ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe 1756 ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe 1756 ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe 1756 ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe 1756 ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe 1756 ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe 1756 ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe 1756 ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe 1756 ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe"C:\Users\Admin\AppData\Local\Temp\ca3f8a4f7aa7c3ada864f75afdf7f2ea.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1756