Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 05:14
Static task
static1
Behavioral task
behavioral1
Sample
6400bb5baddb2d5adfe13fc75e42d060N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6400bb5baddb2d5adfe13fc75e42d060N.exe
Resource
win10v2004-20240802-en
General
-
Target
6400bb5baddb2d5adfe13fc75e42d060N.exe
-
Size
4.7MB
-
MD5
6400bb5baddb2d5adfe13fc75e42d060
-
SHA1
a59deb27c39e81baa8557860f6bad1812ebefb54
-
SHA256
2269944ef4b75790b297b4aee2c6759a7451a449bec02671651b80c78d42f919
-
SHA512
fd566844a68013b6b53d8913f706b264581bb4ae665632c7abd2a1311288f1b04db2488dfc7423164f8f010e8c2eb835e4a62edc403ea792a5f26739131013df
-
SSDEEP
98304:2hRUJRVOlEYJykc36VeOzRz9zLFEyKnrhS3tO8/5w8+cdibkrXlI9P:AUR6EYRcKVJBtyVS9OU5Gcdi2Xi9P
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6400bb5baddb2d5adfe13fc75e42d060N.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 6400bb5baddb2d5adfe13fc75e42d060N.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2624 6400bb5baddb2d5adfe13fc75e42d060N.exe 2624 6400bb5baddb2d5adfe13fc75e42d060N.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\checkwritepermissions.exe 6400bb5baddb2d5adfe13fc75e42d060N.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 6400bb5baddb2d5adfe13fc75e42d060N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6400bb5baddb2d5adfe13fc75e42d060N.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 6400bb5baddb2d5adfe13fc75e42d060N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 6400bb5baddb2d5adfe13fc75e42d060N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName 6400bb5baddb2d5adfe13fc75e42d060N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2624 6400bb5baddb2d5adfe13fc75e42d060N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2624 6400bb5baddb2d5adfe13fc75e42d060N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6400bb5baddb2d5adfe13fc75e42d060N.exe"C:\Users\Admin\AppData\Local\Temp\6400bb5baddb2d5adfe13fc75e42d060N.exe"1⤵
- Checks BIOS information in registry
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2624