Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 08:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
deb679ce05525877ad2238fde7f68300.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
deb679ce05525877ad2238fde7f68300.exe
Resource
win10v2004-20240226-en
1 signatures
150 seconds
General
-
Target
deb679ce05525877ad2238fde7f68300.exe
-
Size
225KB
-
MD5
deb679ce05525877ad2238fde7f68300
-
SHA1
bbc10e1cefa401a64b1763e7b1aa0739345a31ec
-
SHA256
f4536b97c0bd042ab6355a6e4bc737e082bdadccf845f4a17d90d8a8dd5ddd6d
-
SHA512
ca794a5b9e61b6bcad0a02203eb7218e96e52bd37d8dd9fbfff7bc27aeaf2d2947c3ea2575983bf7ca9a21104bef250a582c7cc5ab82dbb99ec7affa4e451c75
-
SSDEEP
6144:JsvlanXCnHs7wClbYxg99atKAUHaA3mH8H3lxwTlI+d:Jm8nXEHiVX99M72mH8H1xmI+
Score
7/10
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion deb679ce05525877ad2238fde7f68300.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\c4e2cafc = "þ:à\u008dO¬ã\x1f«’À\tZùè.ð\u0090ûq“òÝ" deb679ce05525877ad2238fde7f68300.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2148 deb679ce05525877ad2238fde7f68300.exe