Analysis
-
max time kernel
141s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 13:30
Static task
static1
Behavioral task
behavioral1
Sample
f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exe
Resource
win10v2004-20240508-en
General
-
Target
f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exe
-
Size
7.9MB
-
MD5
1d17a6b8be9c7747d29a8119092a2c65
-
SHA1
98b582ae8fd9c03acf7b8b373258010f0dd0b9fd
-
SHA256
f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624
-
SHA512
e32b83757c1d8d50ccd3eded560c78ecb13594047a3cf195b711ec28f9ebda3d942812babf0071e2df1908069b620126008528923123f372fcb4162329ade3a4
-
SSDEEP
196608:mtWofdR+aXdZ7956XZ+3YtzsY6wgjMX9F9u948KqYjEie0tW:9ofdRzX798J+tF7jk9P8Ks
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exedescription ioc process File opened for modification \??\PhysicalDrive0 f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exe -
Drops file in Program Files directory 2 IoCs
Processes:
f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exedescription ioc process File opened for modification C:\Program Files\drmsoft f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exe File opened for modification C:\Program Files\drmsoft\ f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBIOSDate f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exe -
Modifies Control Panel 3 IoCs
Processes:
f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\sShortDate = "yyyy-MM-dd" f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\iDate = "2" f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\sDate = "-" f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exepid process 2824 f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exe 2824 f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exepid process 2824 f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exe 2824 f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exe"C:\Users\Admin\AppData\Local\Temp\f058ce9b51ebdd8cded5cd799ca06cd6f1164f46956a0e125b3c0725f4fbe624.exe"1⤵
- Checks BIOS information in registry
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Enumerates system info in registry
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2824