Analysis
-
max time kernel
59s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 15:54
Static task
static1
Behavioral task
behavioral1
Sample
Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe
Resource
win10v2004-20220812-en
General
-
Target
Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe
-
Size
108KB
-
MD5
f745e3ebd4bd2b8f014a92428ea9efb1
-
SHA1
ae17fefd3c22ac6314123b0735e8f71fe314d98d
-
SHA256
bcac6d2aa8036be33cef0927b193a4aa0c2928790a5f78df9dd6319f02f748f9
-
SHA512
6252a6185e0dbbe7a334ad5f4ae889ebb19e7dcefe489549765436cad8121ef0056cfa27a6c336687d79632f38eaa97f86f57c466059fba002984b8ab2cc2aab
-
SSDEEP
1536:/Vmfaqf7zjrhAc4nu/greNUMoewRBfefI3N3kOF7yhduMacoz5lD:/gff7acdIRgwjeg1/XJzD
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 608 feiilgyktq.pre 1704 feiilgyktq.pre -
resource yara_rule behavioral1/memory/1900-56-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1900-58-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1900-59-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1900-62-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1900-63-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1900-64-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1704-88-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 940 svchost.exe -
Loads dropped DLL 4 IoCs
pid Process 940 svchost.exe 940 svchost.exe 608 feiilgyktq.pre 608 feiilgyktq.pre -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\nwjspkhw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Kxaeawqcx\\nfnplpkhw.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1960 set thread context of 1900 1960 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 28 PID 608 set thread context of 1704 608 feiilgyktq.pre 31 -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe -
Modifies registry class 32 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\ = "Matrix Document" Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\open\command Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\open Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.max\ = "Matrix.Document" Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document feiilgyktq.pre Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\FEIILG~1.PRE \"%1\"" feiilgyktq.pre Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\print\command feiilgyktq.pre Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.max feiilgyktq.pre Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.max\ShellNew feiilgyktq.pre Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\print Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\printto Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.max Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\print\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\STEFAN~1.EXE /p \"%1\"" Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\DefaultIcon feiilgyktq.pre Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\open\command feiilgyktq.pre Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\print\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\FEIILG~1.PRE /p \"%1\"" feiilgyktq.pre Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\printto\command feiilgyktq.pre Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.max\ShellNew\NullFile feiilgyktq.pre Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.max\ShellNew Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\printto\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\FEIILG~1.PRE /pt \"%1\" \"%2\" \"%3\" \"%4\"" feiilgyktq.pre Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\DefaultIcon Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\STEFAN~1.EXE \"%1\"" Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.max\ShellNew\NullFile Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\STEFAN~1.EXE,0" Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\ = "Matrix Document" feiilgyktq.pre Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\print\command Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\printto\command Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\printto\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\STEFAN~1.EXE /pt \"%1\" \"%2\" \"%3\" \"%4\"" Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\FEIILG~1.PRE,0" feiilgyktq.pre Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.max\ = "Matrix.Document" feiilgyktq.pre -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1960 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 608 feiilgyktq.pre 520 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1960 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 1960 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 608 feiilgyktq.pre 608 feiilgyktq.pre -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1900 1960 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 28 PID 1960 wrote to memory of 1900 1960 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 28 PID 1960 wrote to memory of 1900 1960 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 28 PID 1960 wrote to memory of 1900 1960 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 28 PID 1960 wrote to memory of 1900 1960 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 28 PID 1960 wrote to memory of 1900 1960 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 28 PID 1960 wrote to memory of 1900 1960 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 28 PID 1960 wrote to memory of 1900 1960 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 28 PID 1900 wrote to memory of 940 1900 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 29 PID 1900 wrote to memory of 940 1900 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 29 PID 1900 wrote to memory of 940 1900 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 29 PID 1900 wrote to memory of 940 1900 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 29 PID 1900 wrote to memory of 940 1900 Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe 29 PID 940 wrote to memory of 608 940 svchost.exe 30 PID 940 wrote to memory of 608 940 svchost.exe 30 PID 940 wrote to memory of 608 940 svchost.exe 30 PID 940 wrote to memory of 608 940 svchost.exe 30 PID 608 wrote to memory of 1704 608 feiilgyktq.pre 31 PID 608 wrote to memory of 1704 608 feiilgyktq.pre 31 PID 608 wrote to memory of 1704 608 feiilgyktq.pre 31 PID 608 wrote to memory of 1704 608 feiilgyktq.pre 31 PID 608 wrote to memory of 1704 608 feiilgyktq.pre 31 PID 608 wrote to memory of 1704 608 feiilgyktq.pre 31 PID 608 wrote to memory of 1704 608 feiilgyktq.pre 31 PID 608 wrote to memory of 1704 608 feiilgyktq.pre 31 PID 1704 wrote to memory of 520 1704 feiilgyktq.pre 32 PID 1704 wrote to memory of 520 1704 feiilgyktq.pre 32 PID 1704 wrote to memory of 520 1704 feiilgyktq.pre 32 PID 1704 wrote to memory of 520 1704 feiilgyktq.pre 32 PID 1704 wrote to memory of 520 1704 feiilgyktq.pre 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe"C:\Users\Admin\AppData\Local\Temp\Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe"C:\Users\Admin\AppData\Local\Temp\Stefan Boas 02.05.2014 Center GmbH Video-on-Demand.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\feiilgyktq.preC:\Users\Admin\AppData\Local\Temp\feiilgyktq.pre4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Users\Admin\AppData\Local\Temp\feiilgyktq.preC:\Users\Admin\AppData\Local\Temp\feiilgyktq.pre5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:520
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD5f745e3ebd4bd2b8f014a92428ea9efb1
SHA1ae17fefd3c22ac6314123b0735e8f71fe314d98d
SHA256bcac6d2aa8036be33cef0927b193a4aa0c2928790a5f78df9dd6319f02f748f9
SHA5126252a6185e0dbbe7a334ad5f4ae889ebb19e7dcefe489549765436cad8121ef0056cfa27a6c336687d79632f38eaa97f86f57c466059fba002984b8ab2cc2aab
-
Filesize
108KB
MD5f745e3ebd4bd2b8f014a92428ea9efb1
SHA1ae17fefd3c22ac6314123b0735e8f71fe314d98d
SHA256bcac6d2aa8036be33cef0927b193a4aa0c2928790a5f78df9dd6319f02f748f9
SHA5126252a6185e0dbbe7a334ad5f4ae889ebb19e7dcefe489549765436cad8121ef0056cfa27a6c336687d79632f38eaa97f86f57c466059fba002984b8ab2cc2aab
-
Filesize
108KB
MD5f745e3ebd4bd2b8f014a92428ea9efb1
SHA1ae17fefd3c22ac6314123b0735e8f71fe314d98d
SHA256bcac6d2aa8036be33cef0927b193a4aa0c2928790a5f78df9dd6319f02f748f9
SHA5126252a6185e0dbbe7a334ad5f4ae889ebb19e7dcefe489549765436cad8121ef0056cfa27a6c336687d79632f38eaa97f86f57c466059fba002984b8ab2cc2aab
-
Filesize
108KB
MD5f745e3ebd4bd2b8f014a92428ea9efb1
SHA1ae17fefd3c22ac6314123b0735e8f71fe314d98d
SHA256bcac6d2aa8036be33cef0927b193a4aa0c2928790a5f78df9dd6319f02f748f9
SHA5126252a6185e0dbbe7a334ad5f4ae889ebb19e7dcefe489549765436cad8121ef0056cfa27a6c336687d79632f38eaa97f86f57c466059fba002984b8ab2cc2aab
-
Filesize
108KB
MD5f745e3ebd4bd2b8f014a92428ea9efb1
SHA1ae17fefd3c22ac6314123b0735e8f71fe314d98d
SHA256bcac6d2aa8036be33cef0927b193a4aa0c2928790a5f78df9dd6319f02f748f9
SHA5126252a6185e0dbbe7a334ad5f4ae889ebb19e7dcefe489549765436cad8121ef0056cfa27a6c336687d79632f38eaa97f86f57c466059fba002984b8ab2cc2aab
-
Filesize
108KB
MD5f745e3ebd4bd2b8f014a92428ea9efb1
SHA1ae17fefd3c22ac6314123b0735e8f71fe314d98d
SHA256bcac6d2aa8036be33cef0927b193a4aa0c2928790a5f78df9dd6319f02f748f9
SHA5126252a6185e0dbbe7a334ad5f4ae889ebb19e7dcefe489549765436cad8121ef0056cfa27a6c336687d79632f38eaa97f86f57c466059fba002984b8ab2cc2aab
-
Filesize
108KB
MD5f745e3ebd4bd2b8f014a92428ea9efb1
SHA1ae17fefd3c22ac6314123b0735e8f71fe314d98d
SHA256bcac6d2aa8036be33cef0927b193a4aa0c2928790a5f78df9dd6319f02f748f9
SHA5126252a6185e0dbbe7a334ad5f4ae889ebb19e7dcefe489549765436cad8121ef0056cfa27a6c336687d79632f38eaa97f86f57c466059fba002984b8ab2cc2aab