Analysis
-
max time kernel
152s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 11:50
Static task
static1
Behavioral task
behavioral1
Sample
d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.exe
Resource
win10v2004-20221111-en
General
-
Target
d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.exe
-
Size
1.2MB
-
MD5
128e6605b9c711ff949ca9708a2ff526
-
SHA1
ca7d2795ebbea0e77de84b5e206ddb31bcaa2b60
-
SHA256
d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3
-
SHA512
f82991de646b833a8149991159d7e34f4bf56908ca2a46799b4b54467b3d890429b13a37834369ce4d8ad15ad099199c279581b4e537711e6fdd4d6d462961bb
-
SSDEEP
24576:OxGjLiwDOU3uhJbyUUFrlAxRwD6KzLYOcux8eaJOPKlsMK:ziUehJbyBlAxRAbNcG8dhKj
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
VMDetectionNoQt.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions VMDetectionNoQt.exe -
Executes dropped EXE 4 IoCs
Processes:
d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmpdmidecode.exedmidecode.exeVMDetectionNoQt.exepid process 4272 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp 1336 dmidecode.exe 2808 dmidecode.exe 1568 VMDetectionNoQt.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
VMDetectionNoQt.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools VMDetectionNoQt.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
VMDetectionNoQt.exed108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmpdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion VMDetectionNoQt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmpdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp -
Loads dropped DLL 13 IoCs
Processes:
d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmpVMDetectionNoQt.exepid process 4272 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp 4272 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp 4272 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp 4272 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp 4272 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp 4272 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp 4272 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp 4272 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp 4272 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp 4272 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp 4272 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp 4272 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp 1568 VMDetectionNoQt.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
Processes:
d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmpdescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\AVAST Software\Avast d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmpdescription ioc process File opened for modification \??\PhysicalDrive0 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmpdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\ d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.exed108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmpcmd.exedescription pid process target process PID 588 wrote to memory of 4272 588 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.exe d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp PID 588 wrote to memory of 4272 588 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.exe d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp PID 588 wrote to memory of 4272 588 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.exe d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp PID 4272 wrote to memory of 704 4272 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp cmd.exe PID 4272 wrote to memory of 704 4272 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp cmd.exe PID 4272 wrote to memory of 704 4272 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp cmd.exe PID 704 wrote to memory of 1336 704 cmd.exe dmidecode.exe PID 704 wrote to memory of 1336 704 cmd.exe dmidecode.exe PID 704 wrote to memory of 1336 704 cmd.exe dmidecode.exe PID 704 wrote to memory of 2808 704 cmd.exe dmidecode.exe PID 704 wrote to memory of 2808 704 cmd.exe dmidecode.exe PID 704 wrote to memory of 2808 704 cmd.exe dmidecode.exe PID 4272 wrote to memory of 1568 4272 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp VMDetectionNoQt.exe PID 4272 wrote to memory of 1568 4272 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp VMDetectionNoQt.exe PID 4272 wrote to memory of 1568 4272 d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp VMDetectionNoQt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.exe"C:\Users\Admin\AppData\Local\Temp\d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\is-U1PIC.tmp\d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp"C:\Users\Admin\AppData\Local\Temp\is-U1PIC.tmp\d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp" /SL5="$301D0,797032,134656,C:\Users\Admin\AppData\Local\Temp\d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\dmi.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\dmidecode.exedmidecode.exe -s system-product-name4⤵
- Executes dropped EXE
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\dmidecode.exedmidecode.exe -s system-manufacturer4⤵
- Executes dropped EXE
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\VMDetectionNoQt.exe"C:\Users\Admin\AppData\Local\Temp\is-129HN.tmp\VMDetectionNoQt.exe"3⤵
- Looks for VirtualBox Guest Additions in registry
- Executes dropped EXE
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Loads dropped DLL
PID:1568
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
436KB
MD5fde3d82fd69f4499db1fd95d8c775928
SHA18c93529505b97ce08571ccb2153a391b4d1c6358
SHA256e0c659f3ca03e8fc4342bb29957d659c25c81b200f93ae5bb3e42ab824d00c5c
SHA51212bc7c77c88112c5b8d60b2683cfe2111bea2ed5d14af41d7add83953e57d2300cfdfa4278d3e9a67ba48f0809f202dc090bc42a6e317545c39c8eda0625b0c9
-
Filesize
49KB
MD5dde6b2f987e5e3af5e900b432f9375b0
SHA18bc4db4eaae758a193350fc2d7508e89974ad85f
SHA256611052e8584be312a1eb29e8a070511dadf678e45ee5f2a233225d3c9b6b6c94
SHA5120cb2fb15e14071a3088c29e0ffd5ed7e8f37b6d8cf25c32f82176f12cf8921d9a0c1cf70c2e1e8eb5b2ca2f1848e11afab17a77e360645352502cda8a80eecb5
-
Filesize
353KB
MD5fcc0ee28a0fe7ddcdd103f716976034f
SHA1edbefd00d9f147d16f7b108de123b623aec6eb1f
SHA25619fea703ae048bd437060d40469ef0a7105432cc0a2179032cc57768bb7a9daf
SHA512a85afb3dd20b685c91e2440bd838633ad01dc8077c58da42745c5592a0e8ac3b31cb4c809e52b8036298f549e8a08172c4a7bf8d0c3dd1dac91b58e0117cce6a
-
Filesize
353KB
MD5fcc0ee28a0fe7ddcdd103f716976034f
SHA1edbefd00d9f147d16f7b108de123b623aec6eb1f
SHA25619fea703ae048bd437060d40469ef0a7105432cc0a2179032cc57768bb7a9daf
SHA512a85afb3dd20b685c91e2440bd838633ad01dc8077c58da42745c5592a0e8ac3b31cb4c809e52b8036298f549e8a08172c4a7bf8d0c3dd1dac91b58e0117cce6a
-
Filesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
Filesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
Filesize
132KB
MD52d583904a1687b38b60c08d1933c49fa
SHA1e0bd002bbe068f8e2430a81b9b6bbf0c60fbbbf9
SHA256a6fc8a1a54600cc030aeadbc71497a3b16ec4f4edff8a9866d7aa449916866c1
SHA512ae241276de28eb376609d0f5b869415509fe321f291e813d7e62d574501499ef6f6b0e54fdfbcd96e44e6776600498c5616832de89e5ef258d45ee16cad85e48
-
Filesize
97KB
MD54fad395cb2f72e48d7d6bff6fa78f677
SHA109808f26c64ba1299338437be3c118666dbd3d29
SHA2565b955a22764b20c95b5ed2e4e36ceba6d4c3809f2aa6e07f334c60efd86b977f
SHA512d55ce6ef77efb993801e0ad2e4147f06fa99b1a1757674b7b095c7198aa390aa8ab9a8e603c2532c0cacf5b3b24a0626e6ce6081fac53d67fc7a5d315109d1e3
-
Filesize
97KB
MD54fad395cb2f72e48d7d6bff6fa78f677
SHA109808f26c64ba1299338437be3c118666dbd3d29
SHA2565b955a22764b20c95b5ed2e4e36ceba6d4c3809f2aa6e07f334c60efd86b977f
SHA512d55ce6ef77efb993801e0ad2e4147f06fa99b1a1757674b7b095c7198aa390aa8ab9a8e603c2532c0cacf5b3b24a0626e6ce6081fac53d67fc7a5d315109d1e3
-
Filesize
94B
MD54ba677055872c71e23ae296f0c2f9ea9
SHA15425288de3a27a8309e10ddc3b4d492bb287d29f
SHA256a7891cd82c820b3b835b2ea8a89a3611346b256e678c662fb40c6e8dfcdf7998
SHA512aeb2ff22f57f13a543a2d4372e25bfd7b581f75c8e8ac37be1604e25238b7067433018f82e1ffbfece12fa672fb0e60e1b539f21f7ec9e8aabd670a6bc206177
-
Filesize
79KB
MD5bca173dc4758676dd812c7632017d0ae
SHA1fafeae322e8189991e073223e017eaf04029954e
SHA2562f90851d87d6fab45d9721d0c18518ceb60f6619513d06354cdba8bb23dd59d3
SHA5126c2bd8b2a58c2789a3e3e02d251a6e400238ce7c8e17cf8c0de536520b577f869882f4eddfe0a3b91334805e52bbe24348c6d7d2c32f49aec44f4de1c9e08a91
-
Filesize
79KB
MD5bca173dc4758676dd812c7632017d0ae
SHA1fafeae322e8189991e073223e017eaf04029954e
SHA2562f90851d87d6fab45d9721d0c18518ceb60f6619513d06354cdba8bb23dd59d3
SHA5126c2bd8b2a58c2789a3e3e02d251a6e400238ce7c8e17cf8c0de536520b577f869882f4eddfe0a3b91334805e52bbe24348c6d7d2c32f49aec44f4de1c9e08a91
-
Filesize
79KB
MD5bca173dc4758676dd812c7632017d0ae
SHA1fafeae322e8189991e073223e017eaf04029954e
SHA2562f90851d87d6fab45d9721d0c18518ceb60f6619513d06354cdba8bb23dd59d3
SHA5126c2bd8b2a58c2789a3e3e02d251a6e400238ce7c8e17cf8c0de536520b577f869882f4eddfe0a3b91334805e52bbe24348c6d7d2c32f49aec44f4de1c9e08a91
-
Filesize
200KB
MD5d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
Filesize
200KB
MD5d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
Filesize
61KB
MD5f69b165e2739dd17d297f0bf22b781ff
SHA1bd8d0158ce2134877894e49dedd4bee119dd6a7d
SHA2566de64172252407e9b5f50a014214bd57baa6ac703c9d46a728ba32811ffe3cab
SHA5120d903954e117bb5791137ae52de2ec0fee950f311b3b107a7095757b18847f9a0b25450c46165c708355c514914955a6bd40399a1fe48c2c2b326eacc26a5901
-
Filesize
38B
MD503ef384277d7c6d4b59b0a59386cf959
SHA19661dbdf037a745941f54621e485a49761622f64
SHA256731503fb5a76697cc6e0f9ee3f68a3e8c4c7ed25129a7e75bcdab8e0c5562ee5
SHA512a09aa0d6fd0efa05f61336e8016c103bafa9f9c22be08d42f54e7d3d1b96c637406b00b73119fce8705ed1cc1cb898471de967ab9c1813bf2487de59d81f882c
-
Filesize
12KB
MD518ce726bf839bb81459c962f0c6aa58c
SHA1c5784eaf785c409a3ff60ee00abea6c37df26f99
SHA256419d0c70795426a8f18b590a0a0cf627c01fa78d2e6ed180c48889e7e1e3fda1
SHA51224a049565ce48b0a65349886f2ea82a39e13ff5742f1f282a58f754e283150fd074b0f28f50f2c3e6a7554a10b3eb5b9604c630063d8482095e792b01f1d8f5e
-
Filesize
12KB
MD518ce726bf839bb81459c962f0c6aa58c
SHA1c5784eaf785c409a3ff60ee00abea6c37df26f99
SHA256419d0c70795426a8f18b590a0a0cf627c01fa78d2e6ed180c48889e7e1e3fda1
SHA51224a049565ce48b0a65349886f2ea82a39e13ff5742f1f282a58f754e283150fd074b0f28f50f2c3e6a7554a10b3eb5b9604c630063d8482095e792b01f1d8f5e
-
Filesize
556KB
MD554f7de050a9ca0d516818c6e55f3256f
SHA132c6472a815452cc55b214b54ba48b646b6a2748
SHA256d13588f181bfb56a061f2b118f4804714f9046eec80ca7773695c666fae5e752
SHA512c21f7f9d0e23d7c6bd9d627aef3aa6bf361094bfd2fc7d5754a732a71bb65003cc660275007d5444e1fb3e3083a8a4c3b3be81ba268b96d347394a2112dc3df8
-
Filesize
556KB
MD554f7de050a9ca0d516818c6e55f3256f
SHA132c6472a815452cc55b214b54ba48b646b6a2748
SHA256d13588f181bfb56a061f2b118f4804714f9046eec80ca7773695c666fae5e752
SHA512c21f7f9d0e23d7c6bd9d627aef3aa6bf361094bfd2fc7d5754a732a71bb65003cc660275007d5444e1fb3e3083a8a4c3b3be81ba268b96d347394a2112dc3df8
-
C:\Users\Admin\AppData\Local\Temp\is-U1PIC.tmp\d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp
Filesize1.1MB
MD5880e6b53c874b50ee0dc2a9b4175f5a7
SHA1c9ae890d0d4618beab8690083bc42594ff4814a8
SHA2562b526ad1b85e20b9a870cd5fca482f29cdb0a61d7a34b9d264a230ef41f19745
SHA512ef0014716ddf43a111845f779b78299d11eb29db671d00103f1eafe301a226902f224e6b33999505d163cb0f54b2a937d952cccef2ff7144644c08b6553679df
-
C:\Users\Admin\AppData\Local\Temp\is-U1PIC.tmp\d108e184139055ab0428492322e048287b73f50ac417bfcc9d17cd8146d8b0e3.tmp
Filesize1.1MB
MD5880e6b53c874b50ee0dc2a9b4175f5a7
SHA1c9ae890d0d4618beab8690083bc42594ff4814a8
SHA2562b526ad1b85e20b9a870cd5fca482f29cdb0a61d7a34b9d264a230ef41f19745
SHA512ef0014716ddf43a111845f779b78299d11eb29db671d00103f1eafe301a226902f224e6b33999505d163cb0f54b2a937d952cccef2ff7144644c08b6553679df