Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 03:58
Static task
static1
Behavioral task
behavioral1
Sample
ca6d8d712bec2ac010ace47b70719fbd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca6d8d712bec2ac010ace47b70719fbd.exe
Resource
win10v2004-20240226-en
General
-
Target
ca6d8d712bec2ac010ace47b70719fbd.exe
-
Size
577KB
-
MD5
ca6d8d712bec2ac010ace47b70719fbd
-
SHA1
84f3c6f45dc8db755d4e137f5048caf989957c21
-
SHA256
0610ec07519169492ccd24b08b660bcd0452a8c39bc0da08199f0f3d89bc6ae0
-
SHA512
b89d62e36db656c7cb5d3d309902fcc80f933779bf2182a8ab987c96ffa57229bb11e9b1dbbdb9d0bad9b45e5c30c9e4ae6e0603603e00f8c1b9c1c34315a9d8
-
SSDEEP
12288:oSyoOPqWcMqA/miet58gULwxgIYP2hjhTH25:oSyoTW/XeLzMOY+ht2
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ca6d8d712bec2ac010ace47b70719fbd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ca6d8d712bec2ac010ace47b70719fbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ca6d8d712bec2ac010ace47b70719fbd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main ca6d8d712bec2ac010ace47b70719fbd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2408 ca6d8d712bec2ac010ace47b70719fbd.exe Token: SeIncBasePriorityPrivilege 2408 ca6d8d712bec2ac010ace47b70719fbd.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2408 ca6d8d712bec2ac010ace47b70719fbd.exe 2408 ca6d8d712bec2ac010ace47b70719fbd.exe 2408 ca6d8d712bec2ac010ace47b70719fbd.exe 2408 ca6d8d712bec2ac010ace47b70719fbd.exe 2408 ca6d8d712bec2ac010ace47b70719fbd.exe 2408 ca6d8d712bec2ac010ace47b70719fbd.exe 2408 ca6d8d712bec2ac010ace47b70719fbd.exe 2408 ca6d8d712bec2ac010ace47b70719fbd.exe 2408 ca6d8d712bec2ac010ace47b70719fbd.exe 2408 ca6d8d712bec2ac010ace47b70719fbd.exe 2408 ca6d8d712bec2ac010ace47b70719fbd.exe 2408 ca6d8d712bec2ac010ace47b70719fbd.exe 2408 ca6d8d712bec2ac010ace47b70719fbd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca6d8d712bec2ac010ace47b70719fbd.exe"C:\Users\Admin\AppData\Local\Temp\ca6d8d712bec2ac010ace47b70719fbd.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2408