Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 13:01
Static task
static1
Behavioral task
behavioral1
Sample
cb798f3658d474eaeaf48156d815d548.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb798f3658d474eaeaf48156d815d548.exe
Resource
win10v2004-20240226-en
General
-
Target
cb798f3658d474eaeaf48156d815d548.exe
-
Size
1.7MB
-
MD5
cb798f3658d474eaeaf48156d815d548
-
SHA1
8105c91c5f0b390b5c5aeb91dbae1f4b6bceafea
-
SHA256
d4a264a6855e1047037ace08406d1d33232867510438a6ff433b3065a2a8357d
-
SHA512
56dfa03fafc38a8e0f364c215721c5a2973968bfe4e2e7d5a0c4d878fe77ad8e36d16ea6e99d06d304ce2f0ab9a9935b063bf9284ece6d533bebe579e0454b54
-
SSDEEP
24576:7cDOKwzYeQ1v9tXGDqTEQCxIxCBtsVojFL346FLkPF8JUvPLSIXrGaKGCJJ55hwy:YDwrs05e7DEGbTXsZfbzUiF5xv+WTy47
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cb798f3658d474eaeaf48156d815d548.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate cb798f3658d474eaeaf48156d815d548.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5183B69A-D6F5-CB7D-42EB-9F8A2E4B15A5}\InprocServer32 cb798f3658d474eaeaf48156d815d548.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5183B69A-D6F5-CB7D-42EB-9F8A2E4B15A5}\LocalServer32\ = "%SystemRoot%\\SysWow64\\plasrv.exe" cb798f3658d474eaeaf48156d815d548.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5183B69A-D6F5-CB7D-42EB-9F8A2E4B15A5}\Version cb798f3658d474eaeaf48156d815d548.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5183B69A-D6F5-CB7D-42EB-9F8A2E4B15A5}\VersionIndependentProgID cb798f3658d474eaeaf48156d815d548.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5183B69A-D6F5-CB7D-42EB-9F8A2E4B15A5}\AppID = "{03837503-098b-11d8-9414-505054503030}" cb798f3658d474eaeaf48156d815d548.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5183B69A-D6F5-CB7D-42EB-9F8A2E4B15A5}\InprocServer32\ = "%SystemRoot%\\SysWow64\\pla.dll" cb798f3658d474eaeaf48156d815d548.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5183B69A-D6F5-CB7D-42EB-9F8A2E4B15A5}\InprocServer32\ThreadingModel = "both" cb798f3658d474eaeaf48156d815d548.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5183B69A-D6F5-CB7D-42EB-9F8A2E4B15A5}\LocalServer32 cb798f3658d474eaeaf48156d815d548.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5183B69A-D6F5-CB7D-42EB-9F8A2E4B15A5}\ProgID cb798f3658d474eaeaf48156d815d548.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5183B69A-D6F5-CB7D-42EB-9F8A2E4B15A5}\TypeLib cb798f3658d474eaeaf48156d815d548.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5183B69A-D6F5-CB7D-42EB-9F8A2E4B15A5} cb798f3658d474eaeaf48156d815d548.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5183B69A-D6F5-CB7D-42EB-9F8A2E4B15A5}\ = "DataCollectorSet" cb798f3658d474eaeaf48156d815d548.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5183B69A-D6F5-CB7D-42EB-9F8A2E4B15A5}\TypeLib\ = "{03837500-098B-11D8-9414-505054503030}" cb798f3658d474eaeaf48156d815d548.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5183B69A-D6F5-CB7D-42EB-9F8A2E4B15A5}\VersionIndependentProgID\ = "PLA.DataCollectorSet" cb798f3658d474eaeaf48156d815d548.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5183B69A-D6F5-CB7D-42EB-9F8A2E4B15A5}\ProgID\ = "PLA.DataCollectorSet.1" cb798f3658d474eaeaf48156d815d548.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5183B69A-D6F5-CB7D-42EB-9F8A2E4B15A5}\Version\ = "1.0" cb798f3658d474eaeaf48156d815d548.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 3320 cb798f3658d474eaeaf48156d815d548.exe Token: SeIncBasePriorityPrivilege 3320 cb798f3658d474eaeaf48156d815d548.exe Token: 33 3320 cb798f3658d474eaeaf48156d815d548.exe Token: SeIncBasePriorityPrivilege 3320 cb798f3658d474eaeaf48156d815d548.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3320 cb798f3658d474eaeaf48156d815d548.exe 3320 cb798f3658d474eaeaf48156d815d548.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 688 wrote to memory of 3320 688 cb798f3658d474eaeaf48156d815d548.exe 95 PID 688 wrote to memory of 3320 688 cb798f3658d474eaeaf48156d815d548.exe 95 PID 688 wrote to memory of 3320 688 cb798f3658d474eaeaf48156d815d548.exe 95 PID 688 wrote to memory of 3320 688 cb798f3658d474eaeaf48156d815d548.exe 95 PID 688 wrote to memory of 3320 688 cb798f3658d474eaeaf48156d815d548.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb798f3658d474eaeaf48156d815d548.exe"C:\Users\Admin\AppData\Local\Temp\cb798f3658d474eaeaf48156d815d548.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\cb798f3658d474eaeaf48156d815d548.exe"C:\Users\Admin\AppData\Local\Temp\cb798f3658d474eaeaf48156d815d548.exe"2⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4128 --field-trial-handle=2264,i,13734085038406049477,12426093271221802693,262144 --variations-seed-version /prefetch:81⤵PID:4992