Analysis

  • max time kernel
    251s
  • max time network
    264s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    23-08-2021 20:55

General

  • Target

    XOCYAkm_NnnfPmgVDNgu9MQ3.exe

  • Size

    5.3MB

  • MD5

    083da7bfea93dcaac5ca4c910c0c9636

  • SHA1

    5d94f9e397441ee8bb733122f9dce827b80f7e96

  • SHA256

    c06817143741717add66241dcd4f1b6ce497c6242d78793a69661b47a3796535

  • SHA512

    067b5940f3c04bbe908e978b735818cc6e46f8a34a6dfffdf63eca062b855d19a83f12e351dcb5da81464981771bb2a717d39bed9abdd96087cf4cd2996b31b5

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XOCYAkm_NnnfPmgVDNgu9MQ3.exe
    "C:\Users\Admin\AppData\Local\Temp\XOCYAkm_NnnfPmgVDNgu9MQ3.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2116

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2116-114-0x0000000077D70000-0x0000000077EFE000-memory.dmp
    Filesize

    1.6MB

  • memory/2116-116-0x0000000000F30000-0x0000000000F31000-memory.dmp
    Filesize

    4KB

  • memory/2116-118-0x0000000005E70000-0x0000000005E71000-memory.dmp
    Filesize

    4KB

  • memory/2116-119-0x0000000006980000-0x0000000006981000-memory.dmp
    Filesize

    4KB

  • memory/2116-120-0x0000000005A10000-0x0000000005A11000-memory.dmp
    Filesize

    4KB

  • memory/2116-121-0x0000000003730000-0x0000000003731000-memory.dmp
    Filesize

    4KB

  • memory/2116-122-0x0000000005CA0000-0x0000000005CA1000-memory.dmp
    Filesize

    4KB

  • memory/2116-123-0x00000000063B0000-0x00000000063B1000-memory.dmp
    Filesize

    4KB

  • memory/2116-124-0x0000000005970000-0x0000000005E6E000-memory.dmp
    Filesize

    5.0MB

  • memory/2116-125-0x00000000064F0000-0x00000000064F1000-memory.dmp
    Filesize

    4KB

  • memory/2116-126-0x0000000008D30000-0x0000000008D31000-memory.dmp
    Filesize

    4KB

  • memory/2116-127-0x0000000009430000-0x0000000009431000-memory.dmp
    Filesize

    4KB

  • memory/2116-128-0x0000000008F00000-0x0000000008F01000-memory.dmp
    Filesize

    4KB

  • memory/2116-129-0x0000000008FA0000-0x0000000008FA1000-memory.dmp
    Filesize

    4KB

  • memory/2116-130-0x00000000092F0000-0x00000000092F1000-memory.dmp
    Filesize

    4KB

  • memory/2116-131-0x0000000009360000-0x0000000009361000-memory.dmp
    Filesize

    4KB