Analysis

  • max time kernel
    35s
  • max time network
    36s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    25-11-2020 13:36

General

  • Target

    dotEXE1.exe

  • Size

    5.3MB

  • MD5

    d8e3e53d1eb7b3cc029ccd1b4af18aaa

  • SHA1

    3e3057d6e140a8c7b29929b3982f3f27692635f6

  • SHA256

    9811501a32c5d39dfccc30ada4c5538602a53b94d19ba0d6323c830f8234d27c

  • SHA512

    5f55b1a3de85d5d298ce2fe8915b0bc9918f3f0f9758180028dd89ac0b3913a369530eb8e520cffb35eebb46db583325f65a4d070751b7fd4b8022e9b697e667

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Executes dropped EXE 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 70 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dotEXE1.exe
    "C:\Users\Admin\AppData\Local\Temp\dotEXE1.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3408
  • C:\Users\Admin\Desktop\dotEXEPatcher.exe
    "C:\Users\Admin\Desktop\dotEXEPatcher.exe" C:\Users\Admin\Desktop\dotEXE.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Users\Admin\Desktop\dotEXE.exe
      "C:\Users\Admin\Desktop\dotEXE.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2132

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\VenTaz.dll
    MD5

    51cc261f26d457fd9124e0fee73b1685

    SHA1

    1c18998b876a5a3bcf578bf060b7f9ad0b60a1be

    SHA256

    93cde449786de5bc1635979ad01b2bda46ff7898de97b233c067d1609bf92b70

    SHA512

    fb77eb3e0158abf00fdf2c4a6ce796d2bafa3cb1ef7ed5d0e78451e18e6e288919f35ba0cf2cfb8843c41aec149519812aa2f3a6c57cfa2f501c76e020e4e072

  • C:\Users\Admin\Desktop\dotEXE.exe
    MD5

    e86baf40ee8cca6731a956df1c4551df

    SHA1

    6227915aa0348b97e817432c55c486621b7aadd8

    SHA256

    0f1859a87cae5d3062a4b1b7c0785b9b1868c99188a6ad2cba32255f1573e54a

    SHA512

    7b63d40063b591fdf6ba0bad459e242fe191c8216026dfef5088c2463cdabfed1021d4f69ae2306a0add654877eb4ed7c71f8a7f3add044ec50ace5acf8d9d5a

  • C:\Users\Admin\Desktop\dotEXE.exe
    MD5

    e86baf40ee8cca6731a956df1c4551df

    SHA1

    6227915aa0348b97e817432c55c486621b7aadd8

    SHA256

    0f1859a87cae5d3062a4b1b7c0785b9b1868c99188a6ad2cba32255f1573e54a

    SHA512

    7b63d40063b591fdf6ba0bad459e242fe191c8216026dfef5088c2463cdabfed1021d4f69ae2306a0add654877eb4ed7c71f8a7f3add044ec50ace5acf8d9d5a

  • C:\Users\Admin\Desktop\dotEXEPatcher.exe
    MD5

    dce9450af517d871efddfa963473997e

    SHA1

    19ddcb014becd8ab04aed8e454b38cb895198fe3

    SHA256

    ea106eb2cf2861a5008830b95d4ca4051540c1c04bd0fdb1ff9853ef643528c6

    SHA512

    11ba5f9edad86a8a289ee2f8deb532b03eaa55d83617c8286db300b415392d62754c5e0d6e1934fde513ec576b82d7df8b28d12e46118ec82720ebccd03c2eea

  • C:\Users\Admin\Desktop\dotEXEPatcher.exe
    MD5

    dce9450af517d871efddfa963473997e

    SHA1

    19ddcb014becd8ab04aed8e454b38cb895198fe3

    SHA256

    ea106eb2cf2861a5008830b95d4ca4051540c1c04bd0fdb1ff9853ef643528c6

    SHA512

    11ba5f9edad86a8a289ee2f8deb532b03eaa55d83617c8286db300b415392d62754c5e0d6e1934fde513ec576b82d7df8b28d12e46118ec82720ebccd03c2eea

  • \Users\Admin\Desktop\VenTaz.dll
    MD5

    51cc261f26d457fd9124e0fee73b1685

    SHA1

    1c18998b876a5a3bcf578bf060b7f9ad0b60a1be

    SHA256

    93cde449786de5bc1635979ad01b2bda46ff7898de97b233c067d1609bf92b70

    SHA512

    fb77eb3e0158abf00fdf2c4a6ce796d2bafa3cb1ef7ed5d0e78451e18e6e288919f35ba0cf2cfb8843c41aec149519812aa2f3a6c57cfa2f501c76e020e4e072

  • memory/1888-3-0x00007FF68A9C0000-0x00007FF68AEF3000-memory.dmp
    Filesize

    5.2MB

  • memory/1888-4-0x00007FF68A9C0000-0x00007FF68AEF3000-memory.dmp
    Filesize

    5.2MB

  • memory/2132-5-0x0000000000000000-mapping.dmp
  • memory/2132-10-0x00007FF6D6940000-0x00007FF6D70AC000-memory.dmp
    Filesize

    7.4MB

  • memory/2132-11-0x00007FF6D6940000-0x00007FF6D70AC000-memory.dmp
    Filesize

    7.4MB