Analysis

  • max time kernel
    155s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 19:57

General

  • Target

    Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe

  • Size

    267KB

  • MD5

    943faac1ad95786eb98cc863a9b2901d

  • SHA1

    1aac2b86e3b87d67f2f2c7eed1642b6f27c4ab0b

  • SHA256

    1cfc22b377676e749c2471c30d3580faa91b782ae3a05883dbf86c7b2a819756

  • SHA512

    c80b606ead16bef0d39f48b6a79c5f3d98d49ca82a4b28f02a9ec880b133ec77094a2f6c1389dfb70413ad4dbd84b6c82a32bd794b09529b2006d995c75c9766

  • SSDEEP

    6144:btockz/rC9Bc1AMVFRdzsu4ywRZkEJ/6AKN:qBD0c1AMZwpmAK

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe
    "C:\Users\Admin\AppData\Local\Temp\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4208
    • C:\Users\Admin\AppData\Local\Temp\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe
      "C:\Users\Admin\AppData\Local\Temp\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:224
      • C:\Users\Admin\AppData\Local\Temp\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe
        "C:\Users\Admin\AppData\Local\Temp\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2100
        • C:\Users\Admin\AppData\Local\Temp\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe
          "C:\Users\Admin\AppData\Local\Temp\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5012
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\D1C888FB.bat "C:\Users\Admin\AppData\Local\Temp\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4688
            • C:\Windows\SysWOW64\attrib.exe
              attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe"
              6⤵
              • Views/modifies file attributes
              PID:3708
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig.exe
        3⤵
        • Gathers network information
        • Suspicious use of WriteProcessMemory
        PID:4484
        • C:\Users\Admin\AppData\Local\Temp\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe
          "C:\Users\Admin\AppData\Local\Temp\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3972
          • C:\Users\Admin\AppData\Local\Temp\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe
            "C:\Users\Admin\AppData\Local\Temp\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe"
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3736
            • C:\Users\Admin\AppData\Local\Temp\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe
              "C:\Users\Admin\AppData\Local\Temp\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe"
              6⤵
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4360
              • C:\Users\Admin\AppData\Local\Temp\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe
                "C:\Users\Admin\AppData\Local\Temp\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:532
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\F77D3D39.bat "C:\Users\Admin\AppData\Local\Temp\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe"
                  8⤵
                    PID:4784
                    • C:\Windows\SysWOW64\attrib.exe
                      attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe"
                      9⤵
                      • Views/modifies file attributes
                      PID:3148
              • C:\Windows\SysWOW64\print.exe
                print.exe
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Adds Run key to start application
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                PID:3456

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Wolfgang Weber Forderung 07.07.2015 - Stellvertretender Rechtsanwalt Directpay24 GmbH.exe.log

      Filesize

      223B

      MD5

      1cc4c5b51e50ec74a6880b50ecbee28b

      SHA1

      1ba7bb0e86c3d23fb0dc8bf16798d37afb4c4aba

      SHA256

      0556734df26e82e363d47748a3ceedd5c23ea4b9ded6e68bd5c373c1c9f8777b

      SHA512

      5d5532602b381125b24a9bd78781ed722ce0c862214ef17e7d224d269e6e7045c919ab19896dd8d9ae8920726092efe0ffb776a77a9a9539c4a70188d5a4c706

    • C:\Users\Admin\AppData\Local\Temp\D1C888FB.bat

      Filesize

      78B

      MD5

      690561949bf8b0f9b1488be5600a9b90

      SHA1

      4f8bad1bd378d5538b50f7d1cb9696a7895d408e

      SHA256

      a53dd3f0c2abfb4febd0294a20eef6512657c795ccc50768ecb261978c54b4ce

      SHA512

      e4642c37fe92f684264d30adb8db96d8cfcf20f472480dad831754331c64ec25ada121eb029b1a17daaf1049725ffcb41e3ad38eceae1d6ac5cfbcacc48f8699

    • C:\Users\Admin\AppData\Local\Temp\F77D3D39.bat

      Filesize

      76B

      MD5

      5d0d80869627e352b2d1f19ececbf395

      SHA1

      1435bd2b3343704358bce849f7d141827012c8b2

      SHA256

      92ed898be0962d6b5a48eab9035827c8906fe3e50792dad3a881622400810fe4

      SHA512

      1a9b664c48c34b0c78b8c7311be8bce612697ef9e27f6ff9f1dd1f6c6ed2afa759bc6523525be4a675e89853ec2e38711e890e7f4fbc0536e59ad141ac93a5db

    • memory/224-136-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/224-135-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/224-137-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/224-147-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/532-169-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2100-146-0x0000000074840000-0x0000000074DF1000-memory.dmp

      Filesize

      5.7MB

    • memory/3456-172-0x000000007F720000-0x000000007F750000-memory.dmp

      Filesize

      192KB

    • memory/3456-173-0x000000007F720000-0x000000007F750000-memory.dmp

      Filesize

      192KB

    • memory/3736-166-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3972-154-0x0000000074720000-0x0000000074CD1000-memory.dmp

      Filesize

      5.7MB

    • memory/4208-133-0x00000000747E0000-0x0000000074D91000-memory.dmp

      Filesize

      5.7MB

    • memory/4208-138-0x00000000747E0000-0x0000000074D91000-memory.dmp

      Filesize

      5.7MB

    • memory/4208-132-0x00000000747E0000-0x0000000074D91000-memory.dmp

      Filesize

      5.7MB

    • memory/4360-165-0x0000000074820000-0x0000000074DD1000-memory.dmp

      Filesize

      5.7MB

    • memory/4484-150-0x000000007F190000-0x000000007F1C0000-memory.dmp

      Filesize

      192KB

    • memory/4484-148-0x000000007F190000-0x000000007F1C0000-memory.dmp

      Filesize

      192KB

    • memory/5012-157-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB