Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 11:38
Static task
static1
Behavioral task
behavioral1
Sample
e1934b593da61006a25bb8be87fa0b88.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1934b593da61006a25bb8be87fa0b88.exe
Resource
win10v2004-20231215-en
General
-
Target
e1934b593da61006a25bb8be87fa0b88.exe
-
Size
37KB
-
MD5
e1934b593da61006a25bb8be87fa0b88
-
SHA1
1c24d093da31d047b5b4c629463f5c9db6e2ec49
-
SHA256
61be686b05e0db6f20bfd92b3bce606b34246570f9840a613ae144cfdbe35ab6
-
SHA512
6e4b0d9b59f833565a9edbab1684de4bb0090f6e45c657f7a84d941c8f94e6c130e56d8e139912611c4a58e1504a529f669e0e24a024f096caf09a3554666f4d
-
SSDEEP
768:mAS9DEbOfIoze6L9hpYQXUpYGOKS8oRsBo:mASe5rWzpsYQlLo
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate e1934b593da61006a25bb8be87fa0b88.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\runner1 = "C:\\Windows\\mrofinu.exe " e1934b593da61006a25bb8be87fa0b88.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 e1934b593da61006a25bb8be87fa0b88.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz e1934b593da61006a25bb8be87fa0b88.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosDate e1934b593da61006a25bb8be87fa0b88.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WR\nextupdate = "1711539719" e1934b593da61006a25bb8be87fa0b88.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WR e1934b593da61006a25bb8be87fa0b88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WR\cmd e1934b593da61006a25bb8be87fa0b88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WR\version = "44" e1934b593da61006a25bb8be87fa0b88.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1934b593da61006a25bb8be87fa0b88.exe"C:\Users\Admin\AppData\Local\Temp\e1934b593da61006a25bb8be87fa0b88.exe"1⤵
- Checks BIOS information in registry
- Adds Run key to start application
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
PID:2320