Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 13:33
Static task
static1
Behavioral task
behavioral1
Sample
df4a7556062acc96488d3cc00cc7df0a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df4a7556062acc96488d3cc00cc7df0a.exe
Resource
win10v2004-20240226-en
General
-
Target
df4a7556062acc96488d3cc00cc7df0a.exe
-
Size
578KB
-
MD5
df4a7556062acc96488d3cc00cc7df0a
-
SHA1
f131c52b2194333da882af3c1f87909e0b0ba0be
-
SHA256
116cbd30a7187b62b4fd802a3191884cffbeacfc1bd82f61f9298aaf50906056
-
SHA512
8be39ef6f1d11d0a66a3e5ef9196811b6915340d5c42dc51a155e39171479d1d578d55871b338ab1e419aba98acd154621b9dc812adfc7e40922f93a2f050f33
-
SSDEEP
12288:yPkZnNZwi3ZlYq/jVIO00rY/qMdb4GtcZy7HyLXz3v/Os3eSPclCR0j:EKN+qlYKjVz00rYiMd8z3vmsuSPc0R0j
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion df4a7556062acc96488d3cc00cc7df0a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 df4a7556062acc96488d3cc00cc7df0a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum df4a7556062acc96488d3cc00cc7df0a.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main df4a7556062acc96488d3cc00cc7df0a.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2492 df4a7556062acc96488d3cc00cc7df0a.exe 2492 df4a7556062acc96488d3cc00cc7df0a.exe 2492 df4a7556062acc96488d3cc00cc7df0a.exe 2492 df4a7556062acc96488d3cc00cc7df0a.exe 2492 df4a7556062acc96488d3cc00cc7df0a.exe 2492 df4a7556062acc96488d3cc00cc7df0a.exe 2492 df4a7556062acc96488d3cc00cc7df0a.exe 2492 df4a7556062acc96488d3cc00cc7df0a.exe 2492 df4a7556062acc96488d3cc00cc7df0a.exe 2492 df4a7556062acc96488d3cc00cc7df0a.exe 2492 df4a7556062acc96488d3cc00cc7df0a.exe 2492 df4a7556062acc96488d3cc00cc7df0a.exe 2492 df4a7556062acc96488d3cc00cc7df0a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\df4a7556062acc96488d3cc00cc7df0a.exe"C:\Users\Admin\AppData\Local\Temp\df4a7556062acc96488d3cc00cc7df0a.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492