Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    25-06-2024 16:08

General

  • Target

    0fb608f6a0a250f2120ce13e701179caa13be03d3f981295dc08462ee5eb412f.exe

  • Size

    12.8MB

  • MD5

    ebd0cb1bf422f5debd1b197786a7fccc

  • SHA1

    2370605451cb1a8d1a38a05ceb57bcaa8645d9b3

  • SHA256

    0fb608f6a0a250f2120ce13e701179caa13be03d3f981295dc08462ee5eb412f

  • SHA512

    cfb595e6f56c3e6fe84a0b289e98c1f8c86498415711f88fca8529c49ae32a44b520f282fc0f1e193a92431a20613455f345265ed9e903d1d2a82bda2352a134

  • SSDEEP

    196608:votZgs21BRHdoQlSOLM8gYQIdDVpCdHK9CqFjg:votZoBR+0tL9gYQI9M6CCg

Score
9/10

Malware Config

Signatures

  • detect oss ak 1 IoCs

    oss ak information detected.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 37 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0fb608f6a0a250f2120ce13e701179caa13be03d3f981295dc08462ee5eb412f.exe
    "C:\Users\Admin\AppData\Local\Temp\0fb608f6a0a250f2120ce13e701179caa13be03d3f981295dc08462ee5eb412f.exe"
    1⤵
    • Checks BIOS information in registry
    • Enumerates connected drives
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1748

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1748-0-0x0000000000400000-0x0000000001025000-memory.dmp
    Filesize

    12.1MB

  • memory/1748-1-0x0000000075C60000-0x0000000075CA7000-memory.dmp
    Filesize

    284KB

  • memory/1748-506-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-503-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-546-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-504-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-556-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-512-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-514-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-518-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-520-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-530-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-528-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-526-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-524-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-522-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-516-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-510-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-509-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-532-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-534-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-536-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-538-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-554-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-558-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-552-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-550-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-548-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-544-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-542-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-540-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-560-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-566-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-564-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB

  • memory/1748-562-0x0000000002D30000-0x0000000002E41000-memory.dmp
    Filesize

    1.1MB