Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 09:35
Static task
static1
Behavioral task
behavioral1
Sample
85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe
Resource
win10v2004-20240426-en
General
-
Target
85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe
-
Size
4.3MB
-
MD5
5d0c55381fbf6faec7bc87dca6441c30
-
SHA1
2b8f5c7b03fbaaa8dd0522c75e0669b6cdef2c96
-
SHA256
85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd
-
SHA512
6844ab44e4226ecd0f13715d5b9f4264221e81d611c7f36e6790df7647d89357f3863611820c092f4843bc065f2f4f5e9695c0d6da706c83232eb7e40ce090d5
-
SSDEEP
98304:kf4EIDDHK9nhCbJzEaokXvLZw8jzcO/7KNQS8r7NL5j5tDo3STwK7zUFBVEWe4n:Q4HKDQBKkXy+XWt815j5tDobSUFQdQ
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\K: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\R: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\X: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\E: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\G: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\L: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\N: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\B: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\I: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\M: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\O: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\S: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\T: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\W: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\Y: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\H: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\Z: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\P: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\Q: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\U: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\V: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe File opened (read-only) \??\A: 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion 85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe"C:\Users\Admin\AppData\Local\Temp\85d5f23333d384fce8b6720edc38bc29edb8aa6449f235fe6e048805f959e3bd.exe"1⤵
- Checks BIOS information in registry
- Enumerates connected drives
- Checks processor information in registry
- Enumerates system info in registry
PID:2408