Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 10:37
Static task
static1
Behavioral task
behavioral1
Sample
1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe
Resource
win10v2004-20240508-en
General
-
Target
1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe
-
Size
4.8MB
-
MD5
6ca5f07db0fc30105c56f12dd3ea4363
-
SHA1
daa20c33ad243b7aa22708d233d55c5af9fa967a
-
SHA256
1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479
-
SHA512
365a0dbf7bf8a2207f67d7039b6ee98518f6b41455851d1bbc4b078e3cb8b62d0f805aa5c05240f86ae9e18404da800c7d6591ab3b86bb7b0e65e90addce0b65
-
SSDEEP
98304:AoHNZepsSVs2Z/oexNikDBqb+9y6z593NWvQW52ivHjOLM5yol+rQpPZvhj/GF:AotZgs21BRLdoQlSOLM8gYQNZvg
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe File opened (read-only) \??\E: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe File opened (read-only) \??\G: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe File opened (read-only) \??\P: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe File opened (read-only) \??\R: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe File opened (read-only) \??\W: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe File opened (read-only) \??\Y: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe File opened (read-only) \??\H: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe File opened (read-only) \??\K: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe File opened (read-only) \??\M: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe File opened (read-only) \??\N: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe File opened (read-only) \??\Z: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe File opened (read-only) \??\I: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe File opened (read-only) \??\L: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe File opened (read-only) \??\U: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe File opened (read-only) \??\X: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe File opened (read-only) \??\V: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe File opened (read-only) \??\J: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe File opened (read-only) \??\O: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe File opened (read-only) \??\Q: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe File opened (read-only) \??\T: 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion 1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe"C:\Users\Admin\AppData\Local\Temp\1d8d6dba031919adabe79c55d46421e8c7787e14609e2f37be7e7a18b220e479.exe"1⤵
- Checks BIOS information in registry
- Enumerates connected drives
- Checks processor information in registry
- Enumerates system info in registry
PID:1760