Analysis
-
max time kernel
111s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 10:22
Behavioral task
behavioral1
Sample
d33473f72608e48392a647b047d05ac0N.exe
Resource
win7-20240729-en
General
-
Target
d33473f72608e48392a647b047d05ac0N.exe
-
Size
1015KB
-
MD5
d33473f72608e48392a647b047d05ac0
-
SHA1
6964ab70809f53a05603b5c8b7810776c8e0e66c
-
SHA256
136df15647d00bc631e1e398c91310c918e44fb910a93373fe29cd8aec0baba5
-
SHA512
de91bad9cc55ab85b35ff0d053887325dc71ccdea191982d5b3ae6ad3cb0e8cf4bc61954b3c87dbdd5581323f64ffe813ec229b06962b975d667a1f405c48269
-
SSDEEP
24576:KUTIcxlECxghXU6C18/SzVckJTxtMN6Jr2lBfYhUOcpupWDNp7iV5:KUJx22zxhckJTxSNc1h9WyS7G
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d33473f72608e48392a647b047d05ac0N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d33473f72608e48392a647b047d05ac0N.exe -
resource yara_rule behavioral1/memory/2116-0-0x0000000000400000-0x0000000000584000-memory.dmp upx behavioral1/memory/2116-20-0x0000000000400000-0x0000000000584000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 d33473f72608e48392a647b047d05ac0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum d33473f72608e48392a647b047d05ac0N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2116 set thread context of 2800 2116 d33473f72608e48392a647b047d05ac0N.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d33473f72608e48392a647b047d05ac0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d33473f72608e48392a647b047d05ac0N.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main d33473f72608e48392a647b047d05ac0N.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2800 d33473f72608e48392a647b047d05ac0N.exe 2800 d33473f72608e48392a647b047d05ac0N.exe 2800 d33473f72608e48392a647b047d05ac0N.exe 2800 d33473f72608e48392a647b047d05ac0N.exe 2800 d33473f72608e48392a647b047d05ac0N.exe 2800 d33473f72608e48392a647b047d05ac0N.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2800 2116 d33473f72608e48392a647b047d05ac0N.exe 30 PID 2116 wrote to memory of 2800 2116 d33473f72608e48392a647b047d05ac0N.exe 30 PID 2116 wrote to memory of 2800 2116 d33473f72608e48392a647b047d05ac0N.exe 30 PID 2116 wrote to memory of 2800 2116 d33473f72608e48392a647b047d05ac0N.exe 30 PID 2116 wrote to memory of 2800 2116 d33473f72608e48392a647b047d05ac0N.exe 30 PID 2116 wrote to memory of 2800 2116 d33473f72608e48392a647b047d05ac0N.exe 30 PID 2116 wrote to memory of 2800 2116 d33473f72608e48392a647b047d05ac0N.exe 30 PID 2116 wrote to memory of 2800 2116 d33473f72608e48392a647b047d05ac0N.exe 30 PID 2116 wrote to memory of 2800 2116 d33473f72608e48392a647b047d05ac0N.exe 30 PID 2116 wrote to memory of 2800 2116 d33473f72608e48392a647b047d05ac0N.exe 30 PID 2116 wrote to memory of 2800 2116 d33473f72608e48392a647b047d05ac0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d33473f72608e48392a647b047d05ac0N.exe"C:\Users\Admin\AppData\Local\Temp\d33473f72608e48392a647b047d05ac0N.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\d33473f72608e48392a647b047d05ac0N.exe"C:\Users\Admin\AppData\Local\Temp\d33473f72608e48392a647b047d05ac0N.exe" Track="0001000000"2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-