Analysis
-
max time kernel
1587s -
max time network
1778s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22-11-2022 06:53
Behavioral task
behavioral1
Sample
ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe
Resource
win10v2004-20220812-en
General
-
Target
ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe
-
Size
799.1MB
-
MD5
c92f10574719f64de71f15142e927922
-
SHA1
bc1c5d3a8481f8fda448c55d821da9b2f55fed66
-
SHA256
ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de
-
SHA512
b0a51feeb6053602eb56a354b25e1ef7d39856e1daa648a8186546476b7f67358c4c40978035fbf246df00323587cfc309506a60a1e5354a86ac6f8c81db87d6
-
SSDEEP
98304:NjtiC2lkD5L18CJVE0CGTtHdxpXP3UDSMOKS6gqiLZFIfbdSK3m:VtP58CrZf3iVrS6gqCZFcxD2
Malware Config
Extracted
systembc
212.8.244.5:4001
192.168.1.149:4001
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\cache\\minloapi.exe," reg.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exeminloapi.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ minloapi.exe -
Executes dropped EXE 2 IoCs
Processes:
minloapi.exeminloapi.exepid process 2040 minloapi.exe 1664 minloapi.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exeminloapi.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion minloapi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion minloapi.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exeminloapi.exepid process 584 cmd.exe 2040 minloapi.exe -
Processes:
resource yara_rule behavioral1/memory/1608-60-0x0000000000F10000-0x0000000001BA8000-memory.dmp themida behavioral1/memory/1608-61-0x0000000000F10000-0x0000000001BA8000-memory.dmp themida behavioral1/memory/1608-68-0x0000000000F10000-0x0000000001BA8000-memory.dmp themida \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\cache\minloapi.exe themida C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\cache\minloapi.exe themida C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\cache\minloapi.exe themida behavioral1/memory/2040-80-0x0000000000900000-0x0000000001598000-memory.dmp themida behavioral1/memory/2040-81-0x0000000000900000-0x0000000001598000-memory.dmp themida \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\cache\minloapi.exe themida C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\cache\minloapi.exe themida behavioral1/memory/2040-100-0x0000000000900000-0x0000000001598000-memory.dmp themida -
Processes:
ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exeminloapi.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA minloapi.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exeminloapi.exepid process 1608 ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe 2040 minloapi.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
minloapi.exedescription pid process target process PID 2040 set thread context of 1664 2040 minloapi.exe minloapi.exe -
Runs ping.exe 1 TTPs 3 IoCs
Processes:
PING.EXEPING.EXEPING.EXEpid process 916 PING.EXE 1420 PING.EXE 972 PING.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exeminloapi.exepid process 1608 ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe 1608 ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe 1608 ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe 1608 ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe 2040 minloapi.exe 2040 minloapi.exe 2040 minloapi.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exeminloapi.exedescription pid process Token: SeDebugPrivilege 1608 ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe Token: SeDebugPrivilege 2040 minloapi.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.execmd.execmd.exeminloapi.exedescription pid process target process PID 1608 wrote to memory of 820 1608 ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe cmd.exe PID 1608 wrote to memory of 820 1608 ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe cmd.exe PID 1608 wrote to memory of 820 1608 ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe cmd.exe PID 1608 wrote to memory of 820 1608 ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe cmd.exe PID 820 wrote to memory of 916 820 cmd.exe PING.EXE PID 820 wrote to memory of 916 820 cmd.exe PING.EXE PID 820 wrote to memory of 916 820 cmd.exe PING.EXE PID 820 wrote to memory of 916 820 cmd.exe PING.EXE PID 1608 wrote to memory of 584 1608 ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe cmd.exe PID 1608 wrote to memory of 584 1608 ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe cmd.exe PID 1608 wrote to memory of 584 1608 ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe cmd.exe PID 1608 wrote to memory of 584 1608 ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe cmd.exe PID 584 wrote to memory of 1420 584 cmd.exe PING.EXE PID 584 wrote to memory of 1420 584 cmd.exe PING.EXE PID 584 wrote to memory of 1420 584 cmd.exe PING.EXE PID 584 wrote to memory of 1420 584 cmd.exe PING.EXE PID 820 wrote to memory of 1868 820 cmd.exe reg.exe PID 820 wrote to memory of 1868 820 cmd.exe reg.exe PID 820 wrote to memory of 1868 820 cmd.exe reg.exe PID 820 wrote to memory of 1868 820 cmd.exe reg.exe PID 584 wrote to memory of 972 584 cmd.exe PING.EXE PID 584 wrote to memory of 972 584 cmd.exe PING.EXE PID 584 wrote to memory of 972 584 cmd.exe PING.EXE PID 584 wrote to memory of 972 584 cmd.exe PING.EXE PID 584 wrote to memory of 2040 584 cmd.exe minloapi.exe PID 584 wrote to memory of 2040 584 cmd.exe minloapi.exe PID 584 wrote to memory of 2040 584 cmd.exe minloapi.exe PID 584 wrote to memory of 2040 584 cmd.exe minloapi.exe PID 584 wrote to memory of 2040 584 cmd.exe minloapi.exe PID 584 wrote to memory of 2040 584 cmd.exe minloapi.exe PID 584 wrote to memory of 2040 584 cmd.exe minloapi.exe PID 2040 wrote to memory of 1664 2040 minloapi.exe minloapi.exe PID 2040 wrote to memory of 1664 2040 minloapi.exe minloapi.exe PID 2040 wrote to memory of 1664 2040 minloapi.exe minloapi.exe PID 2040 wrote to memory of 1664 2040 minloapi.exe minloapi.exe PID 2040 wrote to memory of 1664 2040 minloapi.exe minloapi.exe PID 2040 wrote to memory of 1664 2040 minloapi.exe minloapi.exe PID 2040 wrote to memory of 1664 2040 minloapi.exe minloapi.exe PID 2040 wrote to memory of 1664 2040 minloapi.exe minloapi.exe PID 2040 wrote to memory of 1664 2040 minloapi.exe minloapi.exe PID 2040 wrote to memory of 1664 2040 minloapi.exe minloapi.exe PID 2040 wrote to memory of 1664 2040 minloapi.exe minloapi.exe PID 2040 wrote to memory of 1664 2040 minloapi.exe minloapi.exe PID 2040 wrote to memory of 1664 2040 minloapi.exe minloapi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe"C:\Users\Admin\AppData\Local\Temp\ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 36 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\cache\minloapi.exe,"2⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 363⤵
- Runs ping.exe
PID:916 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\cache\minloapi.exe,"3⤵
- Modifies WinLogon for persistence
PID:1868 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 44 > nul && copy "C:\Users\Admin\AppData\Local\Temp\ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de.exe" "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\cache\minloapi.exe" && ping 127.0.0.1 -n 44 > nul && "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\cache\minloapi.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 443⤵
- Runs ping.exe
PID:1420 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 443⤵
- Runs ping.exe
PID:972 -
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\cache\minloapi.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\cache\minloapi.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\cache\minloapi.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\cache\minloapi.exe"4⤵
- Executes dropped EXE
PID:1664
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
799.1MB
MD5c92f10574719f64de71f15142e927922
SHA1bc1c5d3a8481f8fda448c55d821da9b2f55fed66
SHA256ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de
SHA512b0a51feeb6053602eb56a354b25e1ef7d39856e1daa648a8186546476b7f67358c4c40978035fbf246df00323587cfc309506a60a1e5354a86ac6f8c81db87d6
-
Filesize
799.1MB
MD5c92f10574719f64de71f15142e927922
SHA1bc1c5d3a8481f8fda448c55d821da9b2f55fed66
SHA256ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de
SHA512b0a51feeb6053602eb56a354b25e1ef7d39856e1daa648a8186546476b7f67358c4c40978035fbf246df00323587cfc309506a60a1e5354a86ac6f8c81db87d6
-
Filesize
799.1MB
MD5c92f10574719f64de71f15142e927922
SHA1bc1c5d3a8481f8fda448c55d821da9b2f55fed66
SHA256ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de
SHA512b0a51feeb6053602eb56a354b25e1ef7d39856e1daa648a8186546476b7f67358c4c40978035fbf246df00323587cfc309506a60a1e5354a86ac6f8c81db87d6
-
Filesize
799.1MB
MD5c92f10574719f64de71f15142e927922
SHA1bc1c5d3a8481f8fda448c55d821da9b2f55fed66
SHA256ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de
SHA512b0a51feeb6053602eb56a354b25e1ef7d39856e1daa648a8186546476b7f67358c4c40978035fbf246df00323587cfc309506a60a1e5354a86ac6f8c81db87d6
-
Filesize
799.1MB
MD5c92f10574719f64de71f15142e927922
SHA1bc1c5d3a8481f8fda448c55d821da9b2f55fed66
SHA256ba137558e3d88cd6d9bb8b5d06662b6de3c878fcbec37cac07a617538df045de
SHA512b0a51feeb6053602eb56a354b25e1ef7d39856e1daa648a8186546476b7f67358c4c40978035fbf246df00323587cfc309506a60a1e5354a86ac6f8c81db87d6