Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-10-2022 14:09

General

  • Target

    b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe

  • Size

    3.8MB

  • MD5

    e1167cb7f3735d4edec5f7219cea64ef

  • SHA1

    9b32cbdba2f3f40f2072dbeb61b345c910e45b39

  • SHA256

    b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17

  • SHA512

    e62104b529dfb87203ee3f8406259284663e0d7bc2c02836253c2c1788a0798241377e48d4609cc0ec2295028ff171a746b3fe1537c8cc235a1f3981699122a8

  • SSDEEP

    98304:SB/mSwJ/stDHmKRai2+DyAEJ9v00FabNuATit4QqKUiqIa4j1yj:SB/m1/Cfe+i9M0oMP//a48j

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 13 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe
    "C:\Users\Admin\AppData\Local\Temp\b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Users\Admin\AppData\Local\Temp\PmIgYzA\TeamViewer.exe
      "C:\Users\Admin\AppData\Local\Temp\PmIgYzA\TeamViewer.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks computer location settings
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1512
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x564
    1⤵
      PID:1532

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\PmIgYzA\TeamViewer.exe

      Filesize

      4.2MB

      MD5

      9dfa2bd6bddc746acea981da411d59d3

      SHA1

      81a41c116af135ae25d8bb72baf4b7f6da6b6ec1

      SHA256

      904280f20d697d876ab90a1b74c0f22a83b859e8b0519cb411fda26f1642f53e

      SHA512

      c335cee9885eab824a5cbb37a00f0dac32c1e2857ad58fb0385d7fce3a1fb74472c0af50beb163765f9707ce705672ed2b657fd513dd790df043201db4df1e99

    • C:\Users\Admin\AppData\Local\Temp\PmIgYzA\TeamViewer.exe

      Filesize

      4.2MB

      MD5

      9dfa2bd6bddc746acea981da411d59d3

      SHA1

      81a41c116af135ae25d8bb72baf4b7f6da6b6ec1

      SHA256

      904280f20d697d876ab90a1b74c0f22a83b859e8b0519cb411fda26f1642f53e

      SHA512

      c335cee9885eab824a5cbb37a00f0dac32c1e2857ad58fb0385d7fce3a1fb74472c0af50beb163765f9707ce705672ed2b657fd513dd790df043201db4df1e99

    • C:\Users\Admin\AppData\Local\Temp\PmIgYzA\TeamViewer_Resource_fr.DLL

      Filesize

      653KB

      MD5

      35fa2ce449deb8b93b8ba73bf35e5e7b

      SHA1

      f93ebb91e0f9a0cf98a362be673d3ca655aded9e

      SHA256

      9634ecaf469149379bba80a745f53d823948c41ce4e347860701cbdff6935192

      SHA512

      cc6644c0bdf95e6b972d5121184e79877f68e7749b0563db8d1e2b55118546760ef90a3e1e4b4f65a837dba5876bfc0cb05b3889fc5d18c731c917f5cf6b0218

    • C:\Users\Admin\AppData\Local\Temp\PmIgYzA\config.bin

      Filesize

      156B

      MD5

      b6bac994a3f222ee614393964025f21c

      SHA1

      20f805a0bfc64efafa8bcfe6d7a9d73dc77b8b81

      SHA256

      dbfc0c9d260ab464d30afa0c988cc56fe6911f30fbc8435287e81dcd83b1f255

      SHA512

      f58423aa0d763e2ee7c6e913d0216f905c13539f0b6219643789f95b625b20bfc212310882f0791cf96be12386c62ab01d911258f268daa7975b282e84944753

    • C:\Users\Admin\AppData\Local\Temp\PmIgYzA\tv.dll

      Filesize

      2.2MB

      MD5

      12890d95c755547a5f206b15ffb51ebc

      SHA1

      abafffe9a34e8acafdf4636a9a3a63bd3eda3179

      SHA256

      28764e617667c9704246c56b613d1b75e489346cbb5df9a14e1ce2d996f5c167

      SHA512

      8f8938e308b15468d771d8d08ed99e2f51fe4a98514271990adbee2a15db088515e07ebbb0f6943ca87c636a7cdcb8260b2d577a85512c20d55ada48aa6f71fe

    • \Users\Admin\AppData\Local\Temp\PmIgYzA\TV.dll

      Filesize

      2.2MB

      MD5

      12890d95c755547a5f206b15ffb51ebc

      SHA1

      abafffe9a34e8acafdf4636a9a3a63bd3eda3179

      SHA256

      28764e617667c9704246c56b613d1b75e489346cbb5df9a14e1ce2d996f5c167

      SHA512

      8f8938e308b15468d771d8d08ed99e2f51fe4a98514271990adbee2a15db088515e07ebbb0f6943ca87c636a7cdcb8260b2d577a85512c20d55ada48aa6f71fe

    • \Users\Admin\AppData\Local\Temp\PmIgYzA\TeamViewer.exe

      Filesize

      4.2MB

      MD5

      9dfa2bd6bddc746acea981da411d59d3

      SHA1

      81a41c116af135ae25d8bb72baf4b7f6da6b6ec1

      SHA256

      904280f20d697d876ab90a1b74c0f22a83b859e8b0519cb411fda26f1642f53e

      SHA512

      c335cee9885eab824a5cbb37a00f0dac32c1e2857ad58fb0385d7fce3a1fb74472c0af50beb163765f9707ce705672ed2b657fd513dd790df043201db4df1e99

    • \Users\Admin\AppData\Local\Temp\PmIgYzA\TeamViewer.exe

      Filesize

      4.2MB

      MD5

      9dfa2bd6bddc746acea981da411d59d3

      SHA1

      81a41c116af135ae25d8bb72baf4b7f6da6b6ec1

      SHA256

      904280f20d697d876ab90a1b74c0f22a83b859e8b0519cb411fda26f1642f53e

      SHA512

      c335cee9885eab824a5cbb37a00f0dac32c1e2857ad58fb0385d7fce3a1fb74472c0af50beb163765f9707ce705672ed2b657fd513dd790df043201db4df1e99

    • \Users\Admin\AppData\Local\Temp\PmIgYzA\TeamViewer.exe

      Filesize

      4.2MB

      MD5

      9dfa2bd6bddc746acea981da411d59d3

      SHA1

      81a41c116af135ae25d8bb72baf4b7f6da6b6ec1

      SHA256

      904280f20d697d876ab90a1b74c0f22a83b859e8b0519cb411fda26f1642f53e

      SHA512

      c335cee9885eab824a5cbb37a00f0dac32c1e2857ad58fb0385d7fce3a1fb74472c0af50beb163765f9707ce705672ed2b657fd513dd790df043201db4df1e99

    • \Users\Admin\AppData\Local\Temp\PmIgYzA\TeamViewer.exe

      Filesize

      4.2MB

      MD5

      9dfa2bd6bddc746acea981da411d59d3

      SHA1

      81a41c116af135ae25d8bb72baf4b7f6da6b6ec1

      SHA256

      904280f20d697d876ab90a1b74c0f22a83b859e8b0519cb411fda26f1642f53e

      SHA512

      c335cee9885eab824a5cbb37a00f0dac32c1e2857ad58fb0385d7fce3a1fb74472c0af50beb163765f9707ce705672ed2b657fd513dd790df043201db4df1e99

    • \Users\Admin\AppData\Local\Temp\PmIgYzA\TeamViewer.exe

      Filesize

      4.2MB

      MD5

      9dfa2bd6bddc746acea981da411d59d3

      SHA1

      81a41c116af135ae25d8bb72baf4b7f6da6b6ec1

      SHA256

      904280f20d697d876ab90a1b74c0f22a83b859e8b0519cb411fda26f1642f53e

      SHA512

      c335cee9885eab824a5cbb37a00f0dac32c1e2857ad58fb0385d7fce3a1fb74472c0af50beb163765f9707ce705672ed2b657fd513dd790df043201db4df1e99

    • \Users\Admin\AppData\Local\Temp\PmIgYzA\TeamViewer.exe

      Filesize

      4.2MB

      MD5

      9dfa2bd6bddc746acea981da411d59d3

      SHA1

      81a41c116af135ae25d8bb72baf4b7f6da6b6ec1

      SHA256

      904280f20d697d876ab90a1b74c0f22a83b859e8b0519cb411fda26f1642f53e

      SHA512

      c335cee9885eab824a5cbb37a00f0dac32c1e2857ad58fb0385d7fce3a1fb74472c0af50beb163765f9707ce705672ed2b657fd513dd790df043201db4df1e99

    • \Users\Admin\AppData\Local\Temp\PmIgYzA\Teamviewer_Resource_fr.dll

      Filesize

      653KB

      MD5

      35fa2ce449deb8b93b8ba73bf35e5e7b

      SHA1

      f93ebb91e0f9a0cf98a362be673d3ca655aded9e

      SHA256

      9634ecaf469149379bba80a745f53d823948c41ce4e347860701cbdff6935192

      SHA512

      cc6644c0bdf95e6b972d5121184e79877f68e7749b0563db8d1e2b55118546760ef90a3e1e4b4f65a837dba5876bfc0cb05b3889fc5d18c731c917f5cf6b0218

    • \Users\Admin\AppData\Local\Temp\PmIgYzA\Teamviewer_Resource_fr.dll

      Filesize

      653KB

      MD5

      35fa2ce449deb8b93b8ba73bf35e5e7b

      SHA1

      f93ebb91e0f9a0cf98a362be673d3ca655aded9e

      SHA256

      9634ecaf469149379bba80a745f53d823948c41ce4e347860701cbdff6935192

      SHA512

      cc6644c0bdf95e6b972d5121184e79877f68e7749b0563db8d1e2b55118546760ef90a3e1e4b4f65a837dba5876bfc0cb05b3889fc5d18c731c917f5cf6b0218

    • \Users\Admin\AppData\Local\Temp\PmIgYzA\Teamviewer_Resource_fr.dll

      Filesize

      653KB

      MD5

      35fa2ce449deb8b93b8ba73bf35e5e7b

      SHA1

      f93ebb91e0f9a0cf98a362be673d3ca655aded9e

      SHA256

      9634ecaf469149379bba80a745f53d823948c41ce4e347860701cbdff6935192

      SHA512

      cc6644c0bdf95e6b972d5121184e79877f68e7749b0563db8d1e2b55118546760ef90a3e1e4b4f65a837dba5876bfc0cb05b3889fc5d18c731c917f5cf6b0218

    • \Users\Admin\AppData\Local\Temp\PmIgYzA\Teamviewer_Resource_fr.dll

      Filesize

      653KB

      MD5

      35fa2ce449deb8b93b8ba73bf35e5e7b

      SHA1

      f93ebb91e0f9a0cf98a362be673d3ca655aded9e

      SHA256

      9634ecaf469149379bba80a745f53d823948c41ce4e347860701cbdff6935192

      SHA512

      cc6644c0bdf95e6b972d5121184e79877f68e7749b0563db8d1e2b55118546760ef90a3e1e4b4f65a837dba5876bfc0cb05b3889fc5d18c731c917f5cf6b0218

    • \Users\Admin\AppData\Local\Temp\PmIgYzA\Teamviewer_Resource_fr.dll

      Filesize

      653KB

      MD5

      35fa2ce449deb8b93b8ba73bf35e5e7b

      SHA1

      f93ebb91e0f9a0cf98a362be673d3ca655aded9e

      SHA256

      9634ecaf469149379bba80a745f53d823948c41ce4e347860701cbdff6935192

      SHA512

      cc6644c0bdf95e6b972d5121184e79877f68e7749b0563db8d1e2b55118546760ef90a3e1e4b4f65a837dba5876bfc0cb05b3889fc5d18c731c917f5cf6b0218

    • \Users\Admin\AppData\Local\Temp\PmIgYzA\Teamviewer_Resource_fr.dll

      Filesize

      653KB

      MD5

      35fa2ce449deb8b93b8ba73bf35e5e7b

      SHA1

      f93ebb91e0f9a0cf98a362be673d3ca655aded9e

      SHA256

      9634ecaf469149379bba80a745f53d823948c41ce4e347860701cbdff6935192

      SHA512

      cc6644c0bdf95e6b972d5121184e79877f68e7749b0563db8d1e2b55118546760ef90a3e1e4b4f65a837dba5876bfc0cb05b3889fc5d18c731c917f5cf6b0218

    • memory/1512-75-0x0000000076EF0000-0x0000000077070000-memory.dmp

      Filesize

      1.5MB

    • memory/1512-76-0x0000000013140000-0x0000000013821000-memory.dmp

      Filesize

      6.9MB

    • memory/1512-73-0x0000000013140000-0x0000000013821000-memory.dmp

      Filesize

      6.9MB

    • memory/1512-78-0x0000000013140000-0x0000000013821000-memory.dmp

      Filesize

      6.9MB

    • memory/1512-79-0x0000000013140000-0x0000000013821000-memory.dmp

      Filesize

      6.9MB

    • memory/1688-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

      Filesize

      8KB