Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe
Resource
win10v2004-20240226-en
General
-
Target
4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe
-
Size
5.7MB
-
MD5
fdc07c602475cd9ce3c6bc5ef0c927e9
-
SHA1
a62c4c834275153fd978a378e174ac84f1773fe5
-
SHA256
4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b
-
SHA512
7fb135cd19227ff897f8bfe5a3319450c00ccbc970754c6d122d9c6d4670050494a27010ce39ed26e8bdd46d478e2a200066e19c62cf603d0e002603ed0aa0a4
-
SSDEEP
98304:E856Qu1k8sGlpog/UE3+TpqgpfdWZhqgP05FPO/MKEkSj:E856Qu13sqD/AptfkNs5FlkSj
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe 3012 4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe"C:\Users\Admin\AppData\Local\Temp\4e42a46dc754172944d5238383f477a99160d702dc82d2090393f082c3a7f41b.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3012