Analysis
-
max time kernel
38s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 03:25
Static task
static1
Behavioral task
behavioral1
Sample
zLp3CUahAnlpkiajyOpX.exe
Resource
win7-20220812-en
12 signatures
150 seconds
General
-
Target
zLp3CUahAnlpkiajyOpX.exe
-
Size
6.4MB
-
MD5
ecf783e90cf44af0f7ff863b80add904
-
SHA1
54836ba96db90520b8693bc182c9d387eb94b32e
-
SHA256
42c84b3413409d44402bbc57459a62d17687ceac75d7372d1dad0e01aa47ff7d
-
SHA512
c7302162c66816cdb87385a3bf178f88b048e3e766159b5f378480e49bca0edecd3351ebe2cdcf30753968c8384751fbc1057e0b9053de15b682b570a52fd5c6
-
SSDEEP
196608:6I9CKlMfBXaGqXNMkm5p8shuq2IrousfFN:6IfSoGiArZ88rolfFN
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ zLp3CUahAnlpkiajyOpX.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion zLp3CUahAnlpkiajyOpX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion zLp3CUahAnlpkiajyOpX.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA zLp3CUahAnlpkiajyOpX.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 904 zLp3CUahAnlpkiajyOpX.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\66\ComDlg zLp3CUahAnlpkiajyOpX.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\66 zLp3CUahAnlpkiajyOpX.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 576 chrome.exe 1736 chrome.exe 1736 chrome.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 904 zLp3CUahAnlpkiajyOpX.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe 1736 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 904 wrote to memory of 896 904 zLp3CUahAnlpkiajyOpX.exe 28 PID 904 wrote to memory of 896 904 zLp3CUahAnlpkiajyOpX.exe 28 PID 904 wrote to memory of 896 904 zLp3CUahAnlpkiajyOpX.exe 28 PID 896 wrote to memory of 1412 896 cmd.exe 29 PID 896 wrote to memory of 1412 896 cmd.exe 29 PID 896 wrote to memory of 1412 896 cmd.exe 29 PID 1412 wrote to memory of 1316 1412 net.exe 30 PID 1412 wrote to memory of 1316 1412 net.exe 30 PID 1412 wrote to memory of 1316 1412 net.exe 30 PID 1736 wrote to memory of 1772 1736 chrome.exe 32 PID 1736 wrote to memory of 1772 1736 chrome.exe 32 PID 1736 wrote to memory of 1772 1736 chrome.exe 32 PID 904 wrote to memory of 1472 904 zLp3CUahAnlpkiajyOpX.exe 33 PID 904 wrote to memory of 1472 904 zLp3CUahAnlpkiajyOpX.exe 33 PID 904 wrote to memory of 1472 904 zLp3CUahAnlpkiajyOpX.exe 33 PID 904 wrote to memory of 1800 904 zLp3CUahAnlpkiajyOpX.exe 34 PID 904 wrote to memory of 1800 904 zLp3CUahAnlpkiajyOpX.exe 34 PID 904 wrote to memory of 1800 904 zLp3CUahAnlpkiajyOpX.exe 34 PID 1800 wrote to memory of 1872 1800 cmd.exe 35 PID 1800 wrote to memory of 1872 1800 cmd.exe 35 PID 1800 wrote to memory of 1872 1800 cmd.exe 35 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 1128 1736 chrome.exe 37 PID 1736 wrote to memory of 576 1736 chrome.exe 36 PID 1736 wrote to memory of 576 1736 chrome.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\zLp3CUahAnlpkiajyOpX.exe"C:\Users\Admin\AppData\Local\Temp\zLp3CUahAnlpkiajyOpX.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net start w32time2⤵
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\system32\net.exenet start w32time3⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start w32time4⤵PID:1316
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1472
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c w32tm /resync2⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\system32\w32tm.exew32tm /resync3⤵PID:1872
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6ac4f50,0x7fef6ac4f60,0x7fef6ac4f702⤵PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1012,16152313072290535046,16589980119909936390,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1012,16152313072290535046,16589980119909936390,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1032 /prefetch:22⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1012,16152313072290535046,16589980119909936390,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1648 /prefetch:82⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1012,16152313072290535046,16589980119909936390,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2016 /prefetch:12⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1012,16152313072290535046,16589980119909936390,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2068 /prefetch:12⤵PID:552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,16152313072290535046,16589980119909936390,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1012,16152313072290535046,16589980119909936390,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3300 /prefetch:22⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1012,16152313072290535046,16589980119909936390,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,16152313072290535046,16589980119909936390,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3516 /prefetch:82⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,16152313072290535046,16589980119909936390,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3628 /prefetch:82⤵PID:2108
-