Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2024, 01:32

General

  • Target

    e07445880ebfa7e1d177147e4389b748.exe

  • Size

    597KB

  • MD5

    e07445880ebfa7e1d177147e4389b748

  • SHA1

    d6f3a0c28d464f810acd911f09ac72bda83c922f

  • SHA256

    04e084244ace03e5f5812fd44fb2a1da9fb589872f24b19d2412688c1fad1e61

  • SHA512

    252af12c1dd830d9dc3c272c5986f9ed82b7085821db26684cb2f473cb2ebe3b5c13b474d6308884a4d7fab0a474bf2cf478a367582ab3120f9f6a3da0f7acc6

  • SSDEEP

    12288:I7Oh3Ijqa1vRKa10FhS2VbxSGWnEA+TeCJa2xijKuvaxS:Gv9MvhfYGVrJxxIvaxS

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e07445880ebfa7e1d177147e4389b748.exe
    "C:\Users\Admin\AppData\Local\Temp\e07445880ebfa7e1d177147e4389b748.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2912

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\logFile.txt

          Filesize

          1KB

          MD5

          50d31ec35157522e9f287ca7795afcce

          SHA1

          2add9290b5266a36ae84136ca5b915f74f748bdb

          SHA256

          27ae8080065572ac9a8759174515945f2ae82cd348196a4fd3ceca41e52ae389

          SHA512

          044cb0d35071202cf4a7f9178c1ed4be29a9e66dfbcfc059fbfb8feeac0ecb58132896ec207640d112ee8405a9a2b92ec2a5130107ce701ab54373cc767c64c9

        • memory/2912-0-0x0000000000030000-0x0000000000250000-memory.dmp

          Filesize

          2.1MB

        • memory/2912-1-0x0000000000360000-0x0000000000363000-memory.dmp

          Filesize

          12KB

        • memory/2912-38-0x0000000000030000-0x0000000000250000-memory.dmp

          Filesize

          2.1MB