Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
e07445880ebfa7e1d177147e4389b748.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e07445880ebfa7e1d177147e4389b748.exe
Resource
win10v2004-20240226-en
General
-
Target
e07445880ebfa7e1d177147e4389b748.exe
-
Size
597KB
-
MD5
e07445880ebfa7e1d177147e4389b748
-
SHA1
d6f3a0c28d464f810acd911f09ac72bda83c922f
-
SHA256
04e084244ace03e5f5812fd44fb2a1da9fb589872f24b19d2412688c1fad1e61
-
SHA512
252af12c1dd830d9dc3c272c5986f9ed82b7085821db26684cb2f473cb2ebe3b5c13b474d6308884a4d7fab0a474bf2cf478a367582ab3120f9f6a3da0f7acc6
-
SSDEEP
12288:I7Oh3Ijqa1vRKa10FhS2VbxSGWnEA+TeCJa2xijKuvaxS:Gv9MvhfYGVrJxxIvaxS
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e07445880ebfa7e1d177147e4389b748.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e07445880ebfa7e1d177147e4389b748.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 e07445880ebfa7e1d177147e4389b748.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main e07445880ebfa7e1d177147e4389b748.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 e07445880ebfa7e1d177147e4389b748.exe 2912 e07445880ebfa7e1d177147e4389b748.exe 2912 e07445880ebfa7e1d177147e4389b748.exe 2912 e07445880ebfa7e1d177147e4389b748.exe 2912 e07445880ebfa7e1d177147e4389b748.exe 2912 e07445880ebfa7e1d177147e4389b748.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e07445880ebfa7e1d177147e4389b748.exe"C:\Users\Admin\AppData\Local\Temp\e07445880ebfa7e1d177147e4389b748.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD550d31ec35157522e9f287ca7795afcce
SHA12add9290b5266a36ae84136ca5b915f74f748bdb
SHA25627ae8080065572ac9a8759174515945f2ae82cd348196a4fd3ceca41e52ae389
SHA512044cb0d35071202cf4a7f9178c1ed4be29a9e66dfbcfc059fbfb8feeac0ecb58132896ec207640d112ee8405a9a2b92ec2a5130107ce701ab54373cc767c64c9