Analysis

  • max time kernel
    38s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    05-05-2022 07:35

General

  • Target

    c61f9a9059f8b8bd0e69f7df4cb09786.exe

  • Size

    3.5MB

  • MD5

    c61f9a9059f8b8bd0e69f7df4cb09786

  • SHA1

    70fffde0debf4559859617d49dc48c54df3c156d

  • SHA256

    84a5a26f1748c3ad1f0b98c438908e8dc842eacc6390484527ee1fe7e56264f5

  • SHA512

    6a838d9663517e1f89bf47f9ba85b72cd431f0d61c4db97e69516ffa313d8bdfc9f619eb51ead5215786e523b43cde3186300cf3bfab7408d580c66cd7d00453

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c61f9a9059f8b8bd0e69f7df4cb09786.exe
    "C:\Users\Admin\AppData\Local\Temp\c61f9a9059f8b8bd0e69f7df4cb09786.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:844

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/844-58-0x0000000000400000-0x0000000000422000-memory.dmp
    Filesize

    136KB

  • memory/844-60-0x0000000000400000-0x0000000000422000-memory.dmp
    Filesize

    136KB

  • memory/844-65-0x000000000041CE46-mapping.dmp
  • memory/844-66-0x0000000000400000-0x0000000000422000-memory.dmp
    Filesize

    136KB

  • memory/844-67-0x0000000000400000-0x0000000000422000-memory.dmp
    Filesize

    136KB

  • memory/1860-54-0x0000000075E41000-0x0000000075E43000-memory.dmp
    Filesize

    8KB

  • memory/1860-55-0x0000000001130000-0x00000000014AE000-memory.dmp
    Filesize

    3.5MB

  • memory/1860-57-0x0000000001130000-0x00000000014AE000-memory.dmp
    Filesize

    3.5MB

  • memory/1860-56-0x0000000001130000-0x00000000014AE000-memory.dmp
    Filesize

    3.5MB