dotEXE1.exe
dotEXE1.exe
5MB
25-11-2020 13:42
d8e3e53d1eb7b3cc029ccd1b4af18aaa
3e3057d6e140a8c7b29929b3982f3f27692635f6
9811501a32c5d39dfccc30ada4c5538602a53b94d19ba0d6323c830f8234d27c
Filter: none
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Tags
TTPs
-
Executes dropped EXEdotEXEPatcher.exedotEXE.exe
Reported IOCs
pid process 1556 dotEXEPatcher.exe 2760 dotEXE.exe -
Checks BIOS information in registrydotEXEPatcher.exedotEXE.exe
Description
BIOS information is often read in order to detect sandboxing environments.
TTPs
Reported IOCs
description ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dotEXEPatcher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dotEXEPatcher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dotEXE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dotEXE.exe -
Loads dropped DLLdotEXE.exe
Reported IOCs
pid process 2760 dotEXE.exe -
Checks whether UAC is enableddotEXEPatcher.exe
Tags
TTPs
Reported IOCs
description ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dotEXEPatcher.exe -
Suspicious use of NtSetInformationThreadHideFromDebuggerdotEXEPatcher.exe
Reported IOCs
pid process 1556 dotEXEPatcher.exe -
Modifies registry classdotEXE1.exe
Reported IOCs
description ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance dotEXE1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance dotEXE1.exe -
Suspicious behavior: EnumeratesProcessesdotEXE.exe
Reported IOCs
pid process 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe 2760 dotEXE.exe -
Suspicious use of SetWindowsHookExdotEXE1.exedotEXEPatcher.exedotEXE.exe
Reported IOCs
pid process 3980 dotEXE1.exe 3980 dotEXE1.exe 1556 dotEXEPatcher.exe 2760 dotEXE.exe -
Suspicious use of WriteProcessMemorydotEXEPatcher.exe
Reported IOCs
description pid process target process PID 1556 wrote to memory of 2760 1556 dotEXEPatcher.exe dotEXE.exe PID 1556 wrote to memory of 2760 1556 dotEXEPatcher.exe dotEXE.exe PID 1556 wrote to memory of 2760 1556 dotEXEPatcher.exe dotEXE.exe
-
C:\Users\Admin\AppData\Local\Temp\dotEXE1.exe"C:\Users\Admin\AppData\Local\Temp\dotEXE1.exe"Modifies registry classSuspicious use of SetWindowsHookEx
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\Desktop\javaw.jar"
-
C:\Users\Admin\Desktop\dotEXEPatcher.exe"C:\Users\Admin\Desktop\dotEXEPatcher.exe" C:\Users\Admin\Desktop\dotEXE.exeExecutes dropped EXEChecks BIOS information in registryChecks whether UAC is enabledSuspicious use of NtSetInformationThreadHideFromDebuggerSuspicious use of SetWindowsHookExSuspicious use of WriteProcessMemory
-
C:\Users\Admin\Desktop\dotEXE.exe"C:\Users\Admin\Desktop\dotEXE.exe"Executes dropped EXEChecks BIOS information in registryLoads dropped DLLSuspicious behavior: EnumeratesProcessesSuspicious use of SetWindowsHookEx
-
C:\Users\Admin\Desktop\VenTaz.dll
MD551cc261f26d457fd9124e0fee73b1685
SHA11c18998b876a5a3bcf578bf060b7f9ad0b60a1be
SHA25693cde449786de5bc1635979ad01b2bda46ff7898de97b233c067d1609bf92b70
SHA512fb77eb3e0158abf00fdf2c4a6ce796d2bafa3cb1ef7ed5d0e78451e18e6e288919f35ba0cf2cfb8843c41aec149519812aa2f3a6c57cfa2f501c76e020e4e072
-
C:\Users\Admin\Desktop\dotEXE.exe
MD5e86baf40ee8cca6731a956df1c4551df
SHA16227915aa0348b97e817432c55c486621b7aadd8
SHA2560f1859a87cae5d3062a4b1b7c0785b9b1868c99188a6ad2cba32255f1573e54a
SHA5127b63d40063b591fdf6ba0bad459e242fe191c8216026dfef5088c2463cdabfed1021d4f69ae2306a0add654877eb4ed7c71f8a7f3add044ec50ace5acf8d9d5a
-
C:\Users\Admin\Desktop\dotEXE.exe
MD5e86baf40ee8cca6731a956df1c4551df
SHA16227915aa0348b97e817432c55c486621b7aadd8
SHA2560f1859a87cae5d3062a4b1b7c0785b9b1868c99188a6ad2cba32255f1573e54a
SHA5127b63d40063b591fdf6ba0bad459e242fe191c8216026dfef5088c2463cdabfed1021d4f69ae2306a0add654877eb4ed7c71f8a7f3add044ec50ace5acf8d9d5a
-
C:\Users\Admin\Desktop\dotEXEPatcher.exe
MD5dce9450af517d871efddfa963473997e
SHA119ddcb014becd8ab04aed8e454b38cb895198fe3
SHA256ea106eb2cf2861a5008830b95d4ca4051540c1c04bd0fdb1ff9853ef643528c6
SHA51211ba5f9edad86a8a289ee2f8deb532b03eaa55d83617c8286db300b415392d62754c5e0d6e1934fde513ec576b82d7df8b28d12e46118ec82720ebccd03c2eea
-
C:\Users\Admin\Desktop\dotEXEPatcher.exe
MD5dce9450af517d871efddfa963473997e
SHA119ddcb014becd8ab04aed8e454b38cb895198fe3
SHA256ea106eb2cf2861a5008830b95d4ca4051540c1c04bd0fdb1ff9853ef643528c6
SHA51211ba5f9edad86a8a289ee2f8deb532b03eaa55d83617c8286db300b415392d62754c5e0d6e1934fde513ec576b82d7df8b28d12e46118ec82720ebccd03c2eea
-
\Users\Admin\Desktop\VenTaz.dll
MD551cc261f26d457fd9124e0fee73b1685
SHA11c18998b876a5a3bcf578bf060b7f9ad0b60a1be
SHA25693cde449786de5bc1635979ad01b2bda46ff7898de97b233c067d1609bf92b70
SHA512fb77eb3e0158abf00fdf2c4a6ce796d2bafa3cb1ef7ed5d0e78451e18e6e288919f35ba0cf2cfb8843c41aec149519812aa2f3a6c57cfa2f501c76e020e4e072
-
memory/1556-3-0x00007FF701850000-0x00007FF701D83000-memory.dmp
-
memory/1556-2-0x00007FF701850000-0x00007FF701D83000-memory.dmp
-
memory/2760-4-0x0000000000000000-mapping.dmp
-
memory/2760-9-0x00007FF7520B0000-0x00007FF75281C000-memory.dmp
-
memory/2760-10-0x00007FF7520B0000-0x00007FF75281C000-memory.dmp