Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe
Resource
win10v2004-20240802-en
General
-
Target
603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe
-
Size
2.1MB
-
MD5
a26e3c5047080c42ff5ef9279c17d41e
-
SHA1
d76c12740cc49b3421fcbeea91ecec5f01253b26
-
SHA256
603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba
-
SHA512
96153b76378ee2a32fae1fdb1268c8d66ddb5b267b5f1d41202ce5bc186a0f76a557df15a2221d1d17b08635b505863d46ea48f5d470ac25b381458de58eb22a
-
SSDEEP
49152:1yy2ZIezkaKQ8Vp/9dEhupMK+FvaX9sq8MgAd0Ixg:RdT3vld+EL+8qq8M9d0I
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1784 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1972 603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe 1972 603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2696 1972 603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe 31 PID 1972 wrote to memory of 2696 1972 603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe 31 PID 1972 wrote to memory of 2696 1972 603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe 31 PID 2696 wrote to memory of 1784 2696 cmd.exe 33 PID 2696 wrote to memory of 1784 2696 cmd.exe 33 PID 2696 wrote to memory of 1784 2696 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe"C:\Users\Admin\AppData\Local\Temp\603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe"1⤵
- Checks BIOS information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc start vgc2⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\sc.exesc start vgc3⤵
- Launches sc.exe
PID:1784
-
-