Analysis

  • max time kernel
    142s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    05-05-2022 07:35

General

  • Target

    c61f9a9059f8b8bd0e69f7df4cb09786.exe

  • Size

    3.5MB

  • MD5

    c61f9a9059f8b8bd0e69f7df4cb09786

  • SHA1

    70fffde0debf4559859617d49dc48c54df3c156d

  • SHA256

    84a5a26f1748c3ad1f0b98c438908e8dc842eacc6390484527ee1fe7e56264f5

  • SHA512

    6a838d9663517e1f89bf47f9ba85b72cd431f0d61c4db97e69516ffa313d8bdfc9f619eb51ead5215786e523b43cde3186300cf3bfab7408d580c66cd7d00453

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c61f9a9059f8b8bd0e69f7df4cb09786.exe
    "C:\Users\Admin\AppData\Local\Temp\c61f9a9059f8b8bd0e69f7df4cb09786.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:388
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2724

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/388-131-0x0000000000320000-0x000000000069E000-memory.dmp
    Filesize

    3.5MB

  • memory/388-130-0x0000000000320000-0x000000000069E000-memory.dmp
    Filesize

    3.5MB

  • memory/388-132-0x0000000000320000-0x000000000069E000-memory.dmp
    Filesize

    3.5MB

  • memory/2724-133-0x0000000000000000-mapping.dmp
  • memory/2724-134-0x0000000000400000-0x0000000000422000-memory.dmp
    Filesize

    136KB

  • memory/2724-139-0x0000000004F30000-0x0000000004F96000-memory.dmp
    Filesize

    408KB

  • memory/2724-140-0x0000000006060000-0x0000000006604000-memory.dmp
    Filesize

    5.6MB

  • memory/2724-141-0x0000000005BB0000-0x0000000005C42000-memory.dmp
    Filesize

    584KB