Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    21/07/2020, 19:27

General

  • Target

    f71be5a1b3f5a867f29b4a7d765affe4826c8366450ca6cc2b2839a4c34fa0f0.bin.exe

  • Size

    3.8MB

  • MD5

    79a7de437dad73c33490fc8dd3f9d6c5

  • SHA1

    3ebd89f9bf858ae9f6d460fde0875ef2061c8535

  • SHA256

    f71be5a1b3f5a867f29b4a7d765affe4826c8366450ca6cc2b2839a4c34fa0f0

  • SHA512

    152990cbc3ccf22d08326a2e5f58cb0f8c96f7d5e20a82a90b894061df85cef800b6e26ee325ced9cea468e7f83fee3f6a6277efdb7d95db81f6517e824e0f73

Score
9/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies registry class 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f71be5a1b3f5a867f29b4a7d765affe4826c8366450ca6cc2b2839a4c34fa0f0.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\f71be5a1b3f5a867f29b4a7d765affe4826c8366450ca6cc2b2839a4c34fa0f0.bin.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Modifies registry class
    PID:3676
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\ключи.txt
      2⤵
        PID:3468
      • C:\Users\Admin\AppData\Local\Temp\start.exe
        "C:\Users\Admin\AppData\Local\Temp\start.exe"
        2⤵
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        • Executes dropped EXE
        PID:3440
        • C:\Users\Admin\AppData\Local\Temp\ESETNOD.exe
          ESETNOD.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Checks whether UAC is enabled
          • Checks BIOS information in registry
          PID:2960

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3676-10-0x00000000032F0000-0x00000000032F1000-memory.dmp

      Filesize

      4KB