Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-10-2022 14:09
Static task
static1
Behavioral task
behavioral1
Sample
b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe
Resource
win7-20220812-en
General
-
Target
b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe
-
Size
3.8MB
-
MD5
e1167cb7f3735d4edec5f7219cea64ef
-
SHA1
9b32cbdba2f3f40f2072dbeb61b345c910e45b39
-
SHA256
b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17
-
SHA512
e62104b529dfb87203ee3f8406259284663e0d7bc2c02836253c2c1788a0798241377e48d4609cc0ec2295028ff171a746b3fe1537c8cc235a1f3981699122a8
-
SSDEEP
98304:SB/mSwJ/stDHmKRai2+DyAEJ9v00FabNuATit4QqKUiqIa4j1yj:SB/m1/Cfe+i9M0oMP//a48j
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TeamViewer.exe -
Executes dropped EXE 1 IoCs
pid Process 1512 TeamViewer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TeamViewer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TeamViewer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Control Panel\International\Geo\Nation TeamViewer.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GatewayLayer 1.3957.lnk b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Wine TeamViewer.exe -
Loads dropped DLL 13 IoCs
pid Process 1688 b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe 1688 b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe 1688 b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe 1688 b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe 1688 b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe 1688 b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe 1512 TeamViewer.exe 1512 TeamViewer.exe 1512 TeamViewer.exe 1512 TeamViewer.exe 1512 TeamViewer.exe 1512 TeamViewer.exe 1512 TeamViewer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1512 TeamViewer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 TeamViewer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString TeamViewer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1512 TeamViewer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1512 1688 b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe 27 PID 1688 wrote to memory of 1512 1688 b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe 27 PID 1688 wrote to memory of 1512 1688 b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe 27 PID 1688 wrote to memory of 1512 1688 b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe"C:\Users\Admin\AppData\Local\Temp\b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\PmIgYzA\TeamViewer.exe"C:\Users\Admin\AppData\Local\Temp\PmIgYzA\TeamViewer.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5641⤵PID:1532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD59dfa2bd6bddc746acea981da411d59d3
SHA181a41c116af135ae25d8bb72baf4b7f6da6b6ec1
SHA256904280f20d697d876ab90a1b74c0f22a83b859e8b0519cb411fda26f1642f53e
SHA512c335cee9885eab824a5cbb37a00f0dac32c1e2857ad58fb0385d7fce3a1fb74472c0af50beb163765f9707ce705672ed2b657fd513dd790df043201db4df1e99
-
Filesize
4.2MB
MD59dfa2bd6bddc746acea981da411d59d3
SHA181a41c116af135ae25d8bb72baf4b7f6da6b6ec1
SHA256904280f20d697d876ab90a1b74c0f22a83b859e8b0519cb411fda26f1642f53e
SHA512c335cee9885eab824a5cbb37a00f0dac32c1e2857ad58fb0385d7fce3a1fb74472c0af50beb163765f9707ce705672ed2b657fd513dd790df043201db4df1e99
-
Filesize
653KB
MD535fa2ce449deb8b93b8ba73bf35e5e7b
SHA1f93ebb91e0f9a0cf98a362be673d3ca655aded9e
SHA2569634ecaf469149379bba80a745f53d823948c41ce4e347860701cbdff6935192
SHA512cc6644c0bdf95e6b972d5121184e79877f68e7749b0563db8d1e2b55118546760ef90a3e1e4b4f65a837dba5876bfc0cb05b3889fc5d18c731c917f5cf6b0218
-
Filesize
156B
MD5b6bac994a3f222ee614393964025f21c
SHA120f805a0bfc64efafa8bcfe6d7a9d73dc77b8b81
SHA256dbfc0c9d260ab464d30afa0c988cc56fe6911f30fbc8435287e81dcd83b1f255
SHA512f58423aa0d763e2ee7c6e913d0216f905c13539f0b6219643789f95b625b20bfc212310882f0791cf96be12386c62ab01d911258f268daa7975b282e84944753
-
Filesize
2.2MB
MD512890d95c755547a5f206b15ffb51ebc
SHA1abafffe9a34e8acafdf4636a9a3a63bd3eda3179
SHA25628764e617667c9704246c56b613d1b75e489346cbb5df9a14e1ce2d996f5c167
SHA5128f8938e308b15468d771d8d08ed99e2f51fe4a98514271990adbee2a15db088515e07ebbb0f6943ca87c636a7cdcb8260b2d577a85512c20d55ada48aa6f71fe
-
Filesize
2.2MB
MD512890d95c755547a5f206b15ffb51ebc
SHA1abafffe9a34e8acafdf4636a9a3a63bd3eda3179
SHA25628764e617667c9704246c56b613d1b75e489346cbb5df9a14e1ce2d996f5c167
SHA5128f8938e308b15468d771d8d08ed99e2f51fe4a98514271990adbee2a15db088515e07ebbb0f6943ca87c636a7cdcb8260b2d577a85512c20d55ada48aa6f71fe
-
Filesize
4.2MB
MD59dfa2bd6bddc746acea981da411d59d3
SHA181a41c116af135ae25d8bb72baf4b7f6da6b6ec1
SHA256904280f20d697d876ab90a1b74c0f22a83b859e8b0519cb411fda26f1642f53e
SHA512c335cee9885eab824a5cbb37a00f0dac32c1e2857ad58fb0385d7fce3a1fb74472c0af50beb163765f9707ce705672ed2b657fd513dd790df043201db4df1e99
-
Filesize
4.2MB
MD59dfa2bd6bddc746acea981da411d59d3
SHA181a41c116af135ae25d8bb72baf4b7f6da6b6ec1
SHA256904280f20d697d876ab90a1b74c0f22a83b859e8b0519cb411fda26f1642f53e
SHA512c335cee9885eab824a5cbb37a00f0dac32c1e2857ad58fb0385d7fce3a1fb74472c0af50beb163765f9707ce705672ed2b657fd513dd790df043201db4df1e99
-
Filesize
4.2MB
MD59dfa2bd6bddc746acea981da411d59d3
SHA181a41c116af135ae25d8bb72baf4b7f6da6b6ec1
SHA256904280f20d697d876ab90a1b74c0f22a83b859e8b0519cb411fda26f1642f53e
SHA512c335cee9885eab824a5cbb37a00f0dac32c1e2857ad58fb0385d7fce3a1fb74472c0af50beb163765f9707ce705672ed2b657fd513dd790df043201db4df1e99
-
Filesize
4.2MB
MD59dfa2bd6bddc746acea981da411d59d3
SHA181a41c116af135ae25d8bb72baf4b7f6da6b6ec1
SHA256904280f20d697d876ab90a1b74c0f22a83b859e8b0519cb411fda26f1642f53e
SHA512c335cee9885eab824a5cbb37a00f0dac32c1e2857ad58fb0385d7fce3a1fb74472c0af50beb163765f9707ce705672ed2b657fd513dd790df043201db4df1e99
-
Filesize
4.2MB
MD59dfa2bd6bddc746acea981da411d59d3
SHA181a41c116af135ae25d8bb72baf4b7f6da6b6ec1
SHA256904280f20d697d876ab90a1b74c0f22a83b859e8b0519cb411fda26f1642f53e
SHA512c335cee9885eab824a5cbb37a00f0dac32c1e2857ad58fb0385d7fce3a1fb74472c0af50beb163765f9707ce705672ed2b657fd513dd790df043201db4df1e99
-
Filesize
4.2MB
MD59dfa2bd6bddc746acea981da411d59d3
SHA181a41c116af135ae25d8bb72baf4b7f6da6b6ec1
SHA256904280f20d697d876ab90a1b74c0f22a83b859e8b0519cb411fda26f1642f53e
SHA512c335cee9885eab824a5cbb37a00f0dac32c1e2857ad58fb0385d7fce3a1fb74472c0af50beb163765f9707ce705672ed2b657fd513dd790df043201db4df1e99
-
Filesize
653KB
MD535fa2ce449deb8b93b8ba73bf35e5e7b
SHA1f93ebb91e0f9a0cf98a362be673d3ca655aded9e
SHA2569634ecaf469149379bba80a745f53d823948c41ce4e347860701cbdff6935192
SHA512cc6644c0bdf95e6b972d5121184e79877f68e7749b0563db8d1e2b55118546760ef90a3e1e4b4f65a837dba5876bfc0cb05b3889fc5d18c731c917f5cf6b0218
-
Filesize
653KB
MD535fa2ce449deb8b93b8ba73bf35e5e7b
SHA1f93ebb91e0f9a0cf98a362be673d3ca655aded9e
SHA2569634ecaf469149379bba80a745f53d823948c41ce4e347860701cbdff6935192
SHA512cc6644c0bdf95e6b972d5121184e79877f68e7749b0563db8d1e2b55118546760ef90a3e1e4b4f65a837dba5876bfc0cb05b3889fc5d18c731c917f5cf6b0218
-
Filesize
653KB
MD535fa2ce449deb8b93b8ba73bf35e5e7b
SHA1f93ebb91e0f9a0cf98a362be673d3ca655aded9e
SHA2569634ecaf469149379bba80a745f53d823948c41ce4e347860701cbdff6935192
SHA512cc6644c0bdf95e6b972d5121184e79877f68e7749b0563db8d1e2b55118546760ef90a3e1e4b4f65a837dba5876bfc0cb05b3889fc5d18c731c917f5cf6b0218
-
Filesize
653KB
MD535fa2ce449deb8b93b8ba73bf35e5e7b
SHA1f93ebb91e0f9a0cf98a362be673d3ca655aded9e
SHA2569634ecaf469149379bba80a745f53d823948c41ce4e347860701cbdff6935192
SHA512cc6644c0bdf95e6b972d5121184e79877f68e7749b0563db8d1e2b55118546760ef90a3e1e4b4f65a837dba5876bfc0cb05b3889fc5d18c731c917f5cf6b0218
-
Filesize
653KB
MD535fa2ce449deb8b93b8ba73bf35e5e7b
SHA1f93ebb91e0f9a0cf98a362be673d3ca655aded9e
SHA2569634ecaf469149379bba80a745f53d823948c41ce4e347860701cbdff6935192
SHA512cc6644c0bdf95e6b972d5121184e79877f68e7749b0563db8d1e2b55118546760ef90a3e1e4b4f65a837dba5876bfc0cb05b3889fc5d18c731c917f5cf6b0218
-
Filesize
653KB
MD535fa2ce449deb8b93b8ba73bf35e5e7b
SHA1f93ebb91e0f9a0cf98a362be673d3ca655aded9e
SHA2569634ecaf469149379bba80a745f53d823948c41ce4e347860701cbdff6935192
SHA512cc6644c0bdf95e6b972d5121184e79877f68e7749b0563db8d1e2b55118546760ef90a3e1e4b4f65a837dba5876bfc0cb05b3889fc5d18c731c917f5cf6b0218