Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    30-06-2024 08:22

General

  • Target

    d8cfde3d37ff0ca46d5edbb6331647c91b93cbe3e61fea2ae364949cc5ca060f.exe

  • Size

    12.8MB

  • MD5

    d740e782a45756aafd5ec5a816981f75

  • SHA1

    1839edaf725f9d0f7d0f9d10e0ef91907acb54cd

  • SHA256

    d8cfde3d37ff0ca46d5edbb6331647c91b93cbe3e61fea2ae364949cc5ca060f

  • SHA512

    d2e871d8f7e2d5a31658a5c0faeb5dadba9336afa36225f25fb84520831705352937382b5c1ab327e2b5ba727d6a125de809d84b51b8150eb18914b8869231f7

  • SSDEEP

    196608:RotZgs21BRldoQlSOLM8gYQzBjS5JHcd9slutXK/CqFju:RotZoBRU0tL9gYQMhcMluc/CCu

Score
9/10

Malware Config

Signatures

  • detect oss ak 1 IoCs

    oss ak information detected.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 37 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d8cfde3d37ff0ca46d5edbb6331647c91b93cbe3e61fea2ae364949cc5ca060f.exe
    "C:\Users\Admin\AppData\Local\Temp\d8cfde3d37ff0ca46d5edbb6331647c91b93cbe3e61fea2ae364949cc5ca060f.exe"
    1⤵
    • Checks BIOS information in registry
    • Enumerates connected drives
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2796

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2796-0-0x0000000000400000-0x0000000001027000-memory.dmp
    Filesize

    12.2MB

  • memory/2796-1-0x0000000076BC0000-0x0000000076C07000-memory.dmp
    Filesize

    284KB

  • memory/2796-503-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-504-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-520-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-518-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-516-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-514-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-512-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-522-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-510-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-508-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-506-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-524-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-526-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-528-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-546-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-560-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-556-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-564-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-562-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-558-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-554-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-552-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-550-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-548-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-544-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-542-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-540-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-538-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-536-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-534-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-532-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB

  • memory/2796-530-0x0000000002D20000-0x0000000002E31000-memory.dmp
    Filesize

    1.1MB