Analysis

  • max time kernel
    152s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 11:50

General

  • Target

    d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.exe

  • Size

    1.2MB

  • MD5

    128e6605b9c711ff949ca9708a2ff526

  • SHA1

    ca7d2795ebbea0e77de84b5e206ddb31bcaa2b60

  • SHA256

    d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3

  • SHA512

    f82991de646b833a8149991159d7e34f4bf56908ca2a46799b4b54467b3d890429b13a37834369ce4d8ad15ad099199c279581b4e537711e6fdd4d6d462961bb

  • SSDEEP

    24576:OxGjLiwDOU3uhJbyUUFrlAxRwD6KzLYOcux8eaJOPKlsMK:ziUehJbyBlAxRAbNcG8dhKj

Malware Config

Signatures

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 13 IoCs
  • Checks for any installed AV software in registry 1 TTPs 3 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.exe
    "C:\Users\Admin\AppData\Local\Temp\d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:588
    • C:\Users\Admin\AppData\Local\Temp\is-U1PIC.tmp\d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-U1PIC.tmp\d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp" /SL5="$301D0,797032,134656,C:\Users\Admin\AppData\Local\Temp\d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks computer location settings
      • Loads dropped DLL
      • Checks for any installed AV software in registry
      • Writes to the Master Boot Record (MBR)
      • Enumerates system info in registry
      • Suspicious use of WriteProcessMemory
      PID:4272
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\dmi.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:704
        • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\dmidecode.exe
          dmidecode.exe -s system-product-name
          4⤵
          • Executes dropped EXE
          PID:1336
        • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\dmidecode.exe
          dmidecode.exe -s system-manufacturer
          4⤵
          • Executes dropped EXE
          PID:2808
      • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\VMDetectionNoQt.exe
        "C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\VMDetectionNoQt.exe"
        3⤵
        • Looks for VirtualBox Guest Additions in registry
        • Executes dropped EXE
        • Looks for VMWare Tools registry key
        • Checks BIOS information in registry
        • Loads dropped DLL
        PID:1568

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\DownloadAndRun.dll

    Filesize

    436KB

    MD5

    fde3d82fd69f4499db1fd95d8c775928

    SHA1

    8c93529505b97ce08571ccb2153a391b4d1c6358

    SHA256

    e0c659f3ca03e8fc4342bb29957d659c25c81b200f93ae5bb3e42ab824d00c5c

    SHA512

    12bc7c77c88112c5b8d60b2683cfe2111bea2ed5d14af41d7add83953e57d2300cfdfa4278d3e9a67ba48f0809f202dc090bc42a6e317545c39c8eda0625b0c9

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\DownloadPageView.dll

    Filesize

    49KB

    MD5

    dde6b2f987e5e3af5e900b432f9375b0

    SHA1

    8bc4db4eaae758a193350fc2d7508e89974ad85f

    SHA256

    611052e8584be312a1eb29e8a070511dadf678e45ee5f2a233225d3c9b6b6c94

    SHA512

    0cb2fb15e14071a3088c29e0ffd5ed7e8f37b6d8cf25c32f82176f12cf8921d9a0c1cf70c2e1e8eb5b2ca2f1848e11afab17a77e360645352502cda8a80eecb5

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\HardwareIDExtractorC.DLL

    Filesize

    353KB

    MD5

    fcc0ee28a0fe7ddcdd103f716976034f

    SHA1

    edbefd00d9f147d16f7b108de123b623aec6eb1f

    SHA256

    19fea703ae048bd437060d40469ef0a7105432cc0a2179032cc57768bb7a9daf

    SHA512

    a85afb3dd20b685c91e2440bd838633ad01dc8077c58da42745c5592a0e8ac3b31cb4c809e52b8036298f549e8a08172c4a7bf8d0c3dd1dac91b58e0117cce6a

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\HardwareIDExtractorC.DLL

    Filesize

    353KB

    MD5

    fcc0ee28a0fe7ddcdd103f716976034f

    SHA1

    edbefd00d9f147d16f7b108de123b623aec6eb1f

    SHA256

    19fea703ae048bd437060d40469ef0a7105432cc0a2179032cc57768bb7a9daf

    SHA512

    a85afb3dd20b685c91e2440bd838633ad01dc8077c58da42745c5592a0e8ac3b31cb4c809e52b8036298f549e8a08172c4a7bf8d0c3dd1dac91b58e0117cce6a

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\InnoCallback.dll

    Filesize

    63KB

    MD5

    1c55ae5ef9980e3b1028447da6105c75

    SHA1

    f85218e10e6aa23b2f5a3ed512895b437e41b45c

    SHA256

    6afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f

    SHA512

    1ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\InnoCallback.dll

    Filesize

    63KB

    MD5

    1c55ae5ef9980e3b1028447da6105c75

    SHA1

    f85218e10e6aa23b2f5a3ed512895b437e41b45c

    SHA256

    6afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f

    SHA512

    1ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\SelfReader.dll

    Filesize

    132KB

    MD5

    2d583904a1687b38b60c08d1933c49fa

    SHA1

    e0bd002bbe068f8e2430a81b9b6bbf0c60fbbbf9

    SHA256

    a6fc8a1a54600cc030aeadbc71497a3b16ec4f4edff8a9866d7aa449916866c1

    SHA512

    ae241276de28eb376609d0f5b869415509fe321f291e813d7e62d574501499ef6f6b0e54fdfbcd96e44e6776600498c5616832de89e5ef258d45ee16cad85e48

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\VMDetectionNoQt.exe

    Filesize

    97KB

    MD5

    4fad395cb2f72e48d7d6bff6fa78f677

    SHA1

    09808f26c64ba1299338437be3c118666dbd3d29

    SHA256

    5b955a22764b20c95b5ed2e4e36ceba6d4c3809f2aa6e07f334c60efd86b977f

    SHA512

    d55ce6ef77efb993801e0ad2e4147f06fa99b1a1757674b7b095c7198aa390aa8ab9a8e603c2532c0cacf5b3b24a0626e6ce6081fac53d67fc7a5d315109d1e3

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\VMDetectionNoQt.exe

    Filesize

    97KB

    MD5

    4fad395cb2f72e48d7d6bff6fa78f677

    SHA1

    09808f26c64ba1299338437be3c118666dbd3d29

    SHA256

    5b955a22764b20c95b5ed2e4e36ceba6d4c3809f2aa6e07f334c60efd86b977f

    SHA512

    d55ce6ef77efb993801e0ad2e4147f06fa99b1a1757674b7b095c7198aa390aa8ab9a8e603c2532c0cacf5b3b24a0626e6ce6081fac53d67fc7a5d315109d1e3

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\dmi.bat

    Filesize

    94B

    MD5

    4ba677055872c71e23ae296f0c2f9ea9

    SHA1

    5425288de3a27a8309e10ddc3b4d492bb287d29f

    SHA256

    a7891cd82c820b3b835b2ea8a89a3611346b256e678c662fb40c6e8dfcdf7998

    SHA512

    aeb2ff22f57f13a543a2d4372e25bfd7b581f75c8e8ac37be1604e25238b7067433018f82e1ffbfece12fa672fb0e60e1b539f21f7ec9e8aabd670a6bc206177

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\dmidecode.exe

    Filesize

    79KB

    MD5

    bca173dc4758676dd812c7632017d0ae

    SHA1

    fafeae322e8189991e073223e017eaf04029954e

    SHA256

    2f90851d87d6fab45d9721d0c18518ceb60f6619513d06354cdba8bb23dd59d3

    SHA512

    6c2bd8b2a58c2789a3e3e02d251a6e400238ce7c8e17cf8c0de536520b577f869882f4eddfe0a3b91334805e52bbe24348c6d7d2c32f49aec44f4de1c9e08a91

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\dmidecode.exe

    Filesize

    79KB

    MD5

    bca173dc4758676dd812c7632017d0ae

    SHA1

    fafeae322e8189991e073223e017eaf04029954e

    SHA256

    2f90851d87d6fab45d9721d0c18518ceb60f6619513d06354cdba8bb23dd59d3

    SHA512

    6c2bd8b2a58c2789a3e3e02d251a6e400238ce7c8e17cf8c0de536520b577f869882f4eddfe0a3b91334805e52bbe24348c6d7d2c32f49aec44f4de1c9e08a91

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\dmidecode.exe

    Filesize

    79KB

    MD5

    bca173dc4758676dd812c7632017d0ae

    SHA1

    fafeae322e8189991e073223e017eaf04029954e

    SHA256

    2f90851d87d6fab45d9721d0c18518ceb60f6619513d06354cdba8bb23dd59d3

    SHA512

    6c2bd8b2a58c2789a3e3e02d251a6e400238ce7c8e17cf8c0de536520b577f869882f4eddfe0a3b91334805e52bbe24348c6d7d2c32f49aec44f4de1c9e08a91

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\itdownload.dll

    Filesize

    200KB

    MD5

    d82a429efd885ca0f324dd92afb6b7b8

    SHA1

    86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

    SHA256

    b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

    SHA512

    5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\itdownload.dll

    Filesize

    200KB

    MD5

    d82a429efd885ca0f324dd92afb6b7b8

    SHA1

    86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

    SHA256

    b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

    SHA512

    5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\mbinfo.dll

    Filesize

    61KB

    MD5

    f69b165e2739dd17d297f0bf22b781ff

    SHA1

    bd8d0158ce2134877894e49dedd4bee119dd6a7d

    SHA256

    6de64172252407e9b5f50a014214bd57baa6ac703c9d46a728ba32811ffe3cab

    SHA512

    0d903954e117bb5791137ae52de2ec0fee950f311b3b107a7095757b18847f9a0b25450c46165c708355c514914955a6bd40399a1fe48c2c2b326eacc26a5901

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\out.txt

    Filesize

    38B

    MD5

    03ef384277d7c6d4b59b0a59386cf959

    SHA1

    9661dbdf037a745941f54621e485a49761622f64

    SHA256

    731503fb5a76697cc6e0f9ee3f68a3e8c4c7ed25129a7e75bcdab8e0c5562ee5

    SHA512

    a09aa0d6fd0efa05f61336e8016c103bafa9f9c22be08d42f54e7d3d1b96c637406b00b73119fce8705ed1cc1cb898471de967ab9c1813bf2487de59d81f882c

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\pafish.dll

    Filesize

    12KB

    MD5

    18ce726bf839bb81459c962f0c6aa58c

    SHA1

    c5784eaf785c409a3ff60ee00abea6c37df26f99

    SHA256

    419d0c70795426a8f18b590a0a0cf627c01fa78d2e6ed180c48889e7e1e3fda1

    SHA512

    24a049565ce48b0a65349886f2ea82a39e13ff5742f1f282a58f754e283150fd074b0f28f50f2c3e6a7554a10b3eb5b9604c630063d8482095e792b01f1d8f5e

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\pafish.dll

    Filesize

    12KB

    MD5

    18ce726bf839bb81459c962f0c6aa58c

    SHA1

    c5784eaf785c409a3ff60ee00abea6c37df26f99

    SHA256

    419d0c70795426a8f18b590a0a0cf627c01fa78d2e6ed180c48889e7e1e3fda1

    SHA512

    24a049565ce48b0a65349886f2ea82a39e13ff5742f1f282a58f754e283150fd074b0f28f50f2c3e6a7554a10b3eb5b9604c630063d8482095e792b01f1d8f5e

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\webbrowser.dll

    Filesize

    556KB

    MD5

    54f7de050a9ca0d516818c6e55f3256f

    SHA1

    32c6472a815452cc55b214b54ba48b646b6a2748

    SHA256

    d13588f181bfb56a061f2b118f4804714f9046eec80ca7773695c666fae5e752

    SHA512

    c21f7f9d0e23d7c6bd9d627aef3aa6bf361094bfd2fc7d5754a732a71bb65003cc660275007d5444e1fb3e3083a8a4c3b3be81ba268b96d347394a2112dc3df8

  • C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\webbrowser.dll

    Filesize

    556KB

    MD5

    54f7de050a9ca0d516818c6e55f3256f

    SHA1

    32c6472a815452cc55b214b54ba48b646b6a2748

    SHA256

    d13588f181bfb56a061f2b118f4804714f9046eec80ca7773695c666fae5e752

    SHA512

    c21f7f9d0e23d7c6bd9d627aef3aa6bf361094bfd2fc7d5754a732a71bb65003cc660275007d5444e1fb3e3083a8a4c3b3be81ba268b96d347394a2112dc3df8

  • C:\Users\Admin\AppData\Local\Temp\is-U1PIC.tmp\d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp

    Filesize

    1.1MB

    MD5

    880e6b53c874b50ee0dc2a9b4175f5a7

    SHA1

    c9ae890d0d4618beab8690083bc42594ff4814a8

    SHA256

    2b526ad1b85e20b9a870cd5fca482f29cdb0a61d7a34b9d264a230ef41f19745

    SHA512

    ef0014716ddf43a111845f779b78299d11eb29db671d00103f1eafe301a226902f224e6b33999505d163cb0f54b2a937d952cccef2ff7144644c08b6553679df

  • C:\Users\Admin\AppData\Local\Temp\is-U1PIC.tmp\d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp

    Filesize

    1.1MB

    MD5

    880e6b53c874b50ee0dc2a9b4175f5a7

    SHA1

    c9ae890d0d4618beab8690083bc42594ff4814a8

    SHA256

    2b526ad1b85e20b9a870cd5fca482f29cdb0a61d7a34b9d264a230ef41f19745

    SHA512

    ef0014716ddf43a111845f779b78299d11eb29db671d00103f1eafe301a226902f224e6b33999505d163cb0f54b2a937d952cccef2ff7144644c08b6553679df

  • memory/588-147-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/588-132-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/588-136-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/704-155-0x0000000000000000-mapping.dmp

  • memory/1336-157-0x0000000000000000-mapping.dmp

  • memory/1568-163-0x0000000000000000-mapping.dmp

  • memory/2808-160-0x0000000000000000-mapping.dmp

  • memory/4272-140-0x00000000032E0000-0x0000000003375000-memory.dmp

    Filesize

    596KB

  • memory/4272-154-0x00000000043D0000-0x0000000004435000-memory.dmp

    Filesize

    404KB

  • memory/4272-134-0x0000000000000000-mapping.dmp

  • memory/4272-144-0x0000000003E20000-0x0000000003E35000-memory.dmp

    Filesize

    84KB

  • memory/4272-150-0x0000000003F80000-0x0000000003FBC000-memory.dmp

    Filesize

    240KB