Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
15-11-2022 11:31
Static task
static1
Behavioral task
behavioral1
Sample
3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe
Resource
win10-20220901-en
General
-
Target
3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe
-
Size
8.2MB
-
MD5
8aaa63d32bc201244a89f771d37c5523
-
SHA1
9f0b6da7824c11e18bfc67fef016dc4c6d034c6e
-
SHA256
3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736
-
SHA512
d75ef26bff91d50fe959a86f20db7813bf8fd6e16ac7d9b17b22401eab29841b60f79bbdd472a1fd29aff7b2f8c8a186f6baf5f29225deb7f879cb76208eaf76
-
SSDEEP
98304:0nf7Zg7kBIjYXCz76QOph+F7ccTDhUCuEw3YtVD8flWyK40uLlcKLh+5D:U0jrf6QOph+LsyTyKruJV0D
Malware Config
Extracted
systembc
89.22.225.242:4193
195.2.93.22:4193
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exehiwolos febocisi moq kadi.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ hiwolos febocisi moq kadi.exe -
Executes dropped EXE 1 IoCs
Processes:
hiwolos febocisi moq kadi.exepid process 4492 hiwolos febocisi moq kadi.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exehiwolos febocisi moq kadi.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion hiwolos febocisi moq kadi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion hiwolos febocisi moq kadi.exe -
Processes:
3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exehiwolos febocisi moq kadi.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA hiwolos febocisi moq kadi.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exehiwolos febocisi moq kadi.exedescription ioc process File opened for modification \??\PhysicalDrive0 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe File opened for modification \??\PhysicalDrive0 hiwolos febocisi moq kadi.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exehiwolos febocisi moq kadi.exepid process 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe 4492 hiwolos febocisi moq kadi.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
hiwolos febocisi moq kadi.exedescription pid process target process PID 4492 set thread context of 1948 4492 hiwolos febocisi moq kadi.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exehiwolos febocisi moq kadi.exepid process 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe 4492 hiwolos febocisi moq kadi.exe 4492 hiwolos febocisi moq kadi.exe 4492 hiwolos febocisi moq kadi.exe 4492 hiwolos febocisi moq kadi.exe 4492 hiwolos febocisi moq kadi.exe 4492 hiwolos febocisi moq kadi.exe 4492 hiwolos febocisi moq kadi.exe 4492 hiwolos febocisi moq kadi.exe 4492 hiwolos febocisi moq kadi.exe 4492 hiwolos febocisi moq kadi.exe 4492 hiwolos febocisi moq kadi.exe 4492 hiwolos febocisi moq kadi.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.execmd.exehiwolos febocisi moq kadi.exedescription pid process target process PID 2764 wrote to memory of 4972 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe schtasks.exe PID 2764 wrote to memory of 4972 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe schtasks.exe PID 2764 wrote to memory of 4972 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe schtasks.exe PID 2764 wrote to memory of 4492 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe hiwolos febocisi moq kadi.exe PID 2764 wrote to memory of 4492 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe hiwolos febocisi moq kadi.exe PID 2764 wrote to memory of 4492 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe hiwolos febocisi moq kadi.exe PID 2764 wrote to memory of 532 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe cmd.exe PID 2764 wrote to memory of 532 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe cmd.exe PID 2764 wrote to memory of 532 2764 3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe cmd.exe PID 532 wrote to memory of 1224 532 cmd.exe chcp.com PID 532 wrote to memory of 1224 532 cmd.exe chcp.com PID 532 wrote to memory of 1224 532 cmd.exe chcp.com PID 532 wrote to memory of 4928 532 cmd.exe PING.EXE PID 532 wrote to memory of 4928 532 cmd.exe PING.EXE PID 532 wrote to memory of 4928 532 cmd.exe PING.EXE PID 4492 wrote to memory of 1948 4492 hiwolos febocisi moq kadi.exe InstallUtil.exe PID 4492 wrote to memory of 1948 4492 hiwolos febocisi moq kadi.exe InstallUtil.exe PID 4492 wrote to memory of 1948 4492 hiwolos febocisi moq kadi.exe InstallUtil.exe PID 4492 wrote to memory of 1948 4492 hiwolos febocisi moq kadi.exe InstallUtil.exe PID 4492 wrote to memory of 1948 4492 hiwolos febocisi moq kadi.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe"C:\Users\Admin\AppData\Local\Temp\3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\hohowoha felite pabor yawexe winebi quejita poveh vakor vavajofe gaso kit\hiwolos febocisi moq kadi.exe"2⤵
- Creates scheduled task(s)
PID:4972 -
C:\Users\Admin\hohowoha felite pabor yawexe winebi quejita poveh vakor vavajofe gaso kit\hiwolos febocisi moq kadi.exe"C:\Users\Admin\hohowoha felite pabor yawexe winebi quejita poveh vakor vavajofe gaso kit\hiwolos febocisi moq kadi.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵PID:1948
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\3735585ffb3ec5d0493b3e3e44323ecb9ef11c78f8ccda56e2d86c02a103f736.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:1224
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:4928
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD574b67ffc2d06bbc77a8ab989ed932c04
SHA160230f37be50ed8c592aedb0cdd7e344ceca2689
SHA25676e755d18897a0991b938706181ac99cf4e7b16d7364214072de155189a38215
SHA512a66f7ae45c15cc3a54d1212ec331f575d8589895f6e4a8626a8dfeffe8be66d62b3c26ab781bc6d3e61f738b1aa64259d60651456c4d3bf3afeed8bf17fd9e56
-
C:\Users\Admin\hohowoha felite pabor yawexe winebi quejita poveh vakor vavajofe gaso kit\hiwolos febocisi moq kadi.exe
Filesize482.6MB
MD526ba946c7c58efd7299717995b4ec2a2
SHA18b608f1813a8f7ea3da4bf39f59bdc5381ea5a49
SHA256f541d135d44c7fa376ec86e04cab29e2ba69624585cf427a7e8205d320c01eb6
SHA512923cd18bf9f95c4de25ba881d42e8b40979e4ba2c88080407e7cebd34e811baad4e727ba0eb8c6306efa854d514d759c662ed1ad1d41d6eb35a5c9c70eb00eef
-
C:\Users\Admin\hohowoha felite pabor yawexe winebi quejita poveh vakor vavajofe gaso kit\hiwolos febocisi moq kadi.exe
Filesize480.7MB
MD5bdfec0b1acdef636f45c63d4d9af18dd
SHA15b679910970936ec7b41e5f74a9ba55a0fe7da60
SHA25604b87abbcc5a9c693a57875c48cc23c38f7721a66a9f54a4e74f94b8a228d19f
SHA512ed61850f280b1dc49e08c0440df0317a90ad30a91ea3abf264bdc1ef56a14b429cd53d78574d08e03a5566fbb41c410ed0955369b0f9c6a16416013dabcb0fdc