Analysis
-
max time kernel
105s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 03:25
Static task
static1
Behavioral task
behavioral1
Sample
zLp3CUahAnlpkiajyOpX.exe
Resource
win7-20220812-en
windows7-x64
12 signatures
150 seconds
General
-
Target
zLp3CUahAnlpkiajyOpX.exe
-
Size
6.4MB
-
MD5
ecf783e90cf44af0f7ff863b80add904
-
SHA1
54836ba96db90520b8693bc182c9d387eb94b32e
-
SHA256
42c84b3413409d44402bbc57459a62d17687ceac75d7372d1dad0e01aa47ff7d
-
SHA512
c7302162c66816cdb87385a3bf178f88b048e3e766159b5f378480e49bca0edecd3351ebe2cdcf30753968c8384751fbc1057e0b9053de15b682b570a52fd5c6
-
SSDEEP
196608:6I9CKlMfBXaGqXNMkm5p8shuq2IrousfFN:6IfSoGiArZ88rolfFN
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ zLp3CUahAnlpkiajyOpX.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion zLp3CUahAnlpkiajyOpX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion zLp3CUahAnlpkiajyOpX.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA zLp3CUahAnlpkiajyOpX.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2856 zLp3CUahAnlpkiajyOpX.exe -
Runs net.exe
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2856 zLp3CUahAnlpkiajyOpX.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2856 wrote to memory of 664 2856 zLp3CUahAnlpkiajyOpX.exe 84 PID 2856 wrote to memory of 664 2856 zLp3CUahAnlpkiajyOpX.exe 84 PID 664 wrote to memory of 4980 664 cmd.exe 85 PID 664 wrote to memory of 4980 664 cmd.exe 85 PID 4980 wrote to memory of 5004 4980 net.exe 86 PID 4980 wrote to memory of 5004 4980 net.exe 86 PID 2856 wrote to memory of 4192 2856 zLp3CUahAnlpkiajyOpX.exe 87 PID 2856 wrote to memory of 4192 2856 zLp3CUahAnlpkiajyOpX.exe 87 PID 2856 wrote to memory of 1260 2856 zLp3CUahAnlpkiajyOpX.exe 88 PID 2856 wrote to memory of 1260 2856 zLp3CUahAnlpkiajyOpX.exe 88 PID 1260 wrote to memory of 1368 1260 cmd.exe 89 PID 1260 wrote to memory of 1368 1260 cmd.exe 89 PID 2856 wrote to memory of 2016 2856 zLp3CUahAnlpkiajyOpX.exe 90 PID 2856 wrote to memory of 2016 2856 zLp3CUahAnlpkiajyOpX.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\zLp3CUahAnlpkiajyOpX.exe"C:\Users\Admin\AppData\Local\Temp\zLp3CUahAnlpkiajyOpX.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net start w32time2⤵
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\system32\net.exenet start w32time3⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start w32time4⤵PID:5004
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4192
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c w32tm /resync2⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\system32\w32tm.exew32tm /resync3⤵PID:1368
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2016
-