Resubmissions

14/06/2022, 09:00

220614-kycenahbg3 10

14/06/2022, 08:57

220614-kwkcgsdadk 10

14/06/2022, 08:39

220614-kkmcpshba2 10

26/05/2022, 09:45

220526-lrcbraebfj 10

26/05/2022, 03:54

220526-egaa3scacj 9

26/05/2022, 03:41

220526-d85evsbhfk 9

Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    26/05/2022, 03:41

General

  • Target

    run.bat

  • Size

    66B

  • MD5

    08a6b0f19f771bd800591a6bcfe63b42

  • SHA1

    a76d6045a24b8fdf6ff038d28fbf0818cc70daac

  • SHA256

    1a47a931685fad15ac28073e3c4c927e7d20408f9fee680258d7976d4955e4fb

  • SHA512

    f7c8bddac1e15b4d7d3612b09f51023a71450c528213e2720ee4c62f7aa4a9693ca43a9a3d0fb66fe671439fa3cf5875b93a153104f7cedd89bedd69d69c996e

Score
9/10

Malware Config

Signatures

  • Enumerates VirtualBox registry keys 2 TTPs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs
  • Checks BIOS information in registry 2 TTPs 3 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious behavior: EnumeratesProcesses 41 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\run.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\copy.dll,AWpWaxmOds
      2⤵
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious behavior: EnumeratesProcesses
      PID:908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads