Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 14:15
Static task
static1
Behavioral task
behavioral1
Sample
3.exe
Resource
win7-20240903-en
General
-
Target
3.exe
-
Size
27.7MB
-
MD5
e516566b25ae853edd6aad00854d782a
-
SHA1
868bc5e3b851337eb9094de303e395fc5be8d7ae
-
SHA256
9cb2b6cafc2c6ec61d2f997789e7a923d71b8663f57a531820d958971f8a8e84
-
SHA512
7b631df7d1786f901669869020430a2caa7b8fc493c5331a00137f60af0827e8c42638a89f1381aed2954bc0b280a1591a0561ba3aad5503f541d8ca12f466c5
-
SSDEEP
393216:aT903qKSVL/D0mOWBLGZz1cVeN1zSuCK+RO4b61B2YpLlsmb2wIoV1Keejdnd:ah0OVL/rBLGp1JdCr6zRlsm1IoV1G9d
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: 3.exe File opened (read-only) \??\Q: 3.exe File opened (read-only) \??\T: 3.exe File opened (read-only) \??\Y: 3.exe File opened (read-only) \??\Z: 3.exe File opened (read-only) \??\E: 3.exe File opened (read-only) \??\G: 3.exe File opened (read-only) \??\I: 3.exe File opened (read-only) \??\K: 3.exe File opened (read-only) \??\P: 3.exe File opened (read-only) \??\R: 3.exe File opened (read-only) \??\V: 3.exe File opened (read-only) \??\H: 3.exe File opened (read-only) \??\J: 3.exe File opened (read-only) \??\M: 3.exe File opened (read-only) \??\N: 3.exe File opened (read-only) \??\W: 3.exe File opened (read-only) \??\X: 3.exe File opened (read-only) \??\O: 3.exe File opened (read-only) \??\S: 3.exe File opened (read-only) \??\U: 3.exe -
resource yara_rule behavioral1/memory/2764-43-0x0000000000400000-0x0000000000F24000-memory.dmp upx behavioral1/memory/2764-46-0x0000000000400000-0x0000000000F24000-memory.dmp upx behavioral1/memory/2764-73-0x0000000000400000-0x0000000000F24000-memory.dmp upx behavioral1/memory/2388-76-0x0000000000400000-0x0000000000F24000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS 3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName 3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion 3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion 3.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2764 3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2440 3.exe 2580 3.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2764 2440 3.exe 30 PID 2440 wrote to memory of 2764 2440 3.exe 30 PID 2440 wrote to memory of 2764 2440 3.exe 30 PID 2440 wrote to memory of 2764 2440 3.exe 30 PID 2440 wrote to memory of 2764 2440 3.exe 30 PID 2440 wrote to memory of 2764 2440 3.exe 30 PID 2440 wrote to memory of 2764 2440 3.exe 30 PID 2440 wrote to memory of 2764 2440 3.exe 30 PID 2440 wrote to memory of 2764 2440 3.exe 30 PID 2440 wrote to memory of 2764 2440 3.exe 30 PID 2440 wrote to memory of 2764 2440 3.exe 30 PID 2440 wrote to memory of 2764 2440 3.exe 30 PID 2440 wrote to memory of 2764 2440 3.exe 30 PID 2440 wrote to memory of 2764 2440 3.exe 30 PID 2440 wrote to memory of 2764 2440 3.exe 30 PID 2440 wrote to memory of 2764 2440 3.exe 30 PID 2440 wrote to memory of 2764 2440 3.exe 30 PID 2440 wrote to memory of 2764 2440 3.exe 30 PID 2440 wrote to memory of 2764 2440 3.exe 30 PID 2764 wrote to memory of 2580 2764 3.exe 31 PID 2764 wrote to memory of 2580 2764 3.exe 31 PID 2764 wrote to memory of 2580 2764 3.exe 31 PID 2764 wrote to memory of 2580 2764 3.exe 31 PID 2580 wrote to memory of 2388 2580 3.exe 32 PID 2580 wrote to memory of 2388 2580 3.exe 32 PID 2580 wrote to memory of 2388 2580 3.exe 32 PID 2580 wrote to memory of 2388 2580 3.exe 32 PID 2580 wrote to memory of 2388 2580 3.exe 32 PID 2580 wrote to memory of 2388 2580 3.exe 32 PID 2580 wrote to memory of 2388 2580 3.exe 32 PID 2580 wrote to memory of 2388 2580 3.exe 32 PID 2580 wrote to memory of 2388 2580 3.exe 32 PID 2580 wrote to memory of 2388 2580 3.exe 32 PID 2580 wrote to memory of 2388 2580 3.exe 32 PID 2580 wrote to memory of 2388 2580 3.exe 32 PID 2580 wrote to memory of 2388 2580 3.exe 32 PID 2580 wrote to memory of 2388 2580 3.exe 32 PID 2580 wrote to memory of 2388 2580 3.exe 32 PID 2580 wrote to memory of 2388 2580 3.exe 32 PID 2580 wrote to memory of 2388 2580 3.exe 32 PID 2580 wrote to memory of 2388 2580 3.exe 32 PID 2580 wrote to memory of 2388 2580 3.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"2⤵
- Checks BIOS information in registry
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"4⤵PID:2388
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
4.5MB
MD59b77414cc34417bb9dd753e14e26ef49
SHA154cc4425f9656a19fcde9cb694ffff221f8b733f
SHA256d0b0427a276b2506138bb4bc223e27eed7a33aeea7a7ac080b2ec85c5d950ffe
SHA512d91ea43e40bc864c7587f9e5ec03ada8a7d027c4c393dfc6ca6f004b4cc89e8157a33672439020e2081a224c22840653dda4976a89d5378404cbae2b53ad9edc