Analysis

  • max time kernel
    162s
  • max time network
    231s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 06:51

General

  • Target

    eb0deb25600ed4bd927e310f825278f412178e91523c38215555ef5f55aa568e.exe

  • Size

    1.8MB

  • MD5

    844ae729e51154cd161ecc3b9addc20d

  • SHA1

    93f671334d4838cd6e3f632dd21dfae47fc742b5

  • SHA256

    eb0deb25600ed4bd927e310f825278f412178e91523c38215555ef5f55aa568e

  • SHA512

    cf5324caf2aef459afd2630a0b4f8fff6a6e8e10c0bfa16c58de9a0c3832ae1179bb8b745b18f2641516d319b285dd44e7b64a7b27e1723b8cc19cd3593e19cd

  • SSDEEP

    49152:Vb9j4giaUnc+cKsyn1bnen3gjAX61cVwmc+UmHkK7OSlzS:jBiaUnc/Kh1benQm614wIUmEPSlzS

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 14 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 5 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 13 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb0deb25600ed4bd927e310f825278f412178e91523c38215555ef5f55aa568e.exe
    "C:\Users\Admin\AppData\Local\Temp\eb0deb25600ed4bd927e310f825278f412178e91523c38215555ef5f55aa568e.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1000
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\SysWOW64\schtasks.exe" /Delete /tn "4CEFD9B73D6C-1CRMOI2" /f
      2⤵
        PID:992
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\SysWOW64\schtasks.exe" /Create /TR "C:\Users\Admin\AppData\Roaming\ARHome\Updater.exe" /SC DAILY /TN "4CEFD9B73D6C-1CRMOI2" /ST 17:27:00 /du 0024:00 /RI 360 /RL HIGHEST /f
        2⤵
        • Creates scheduled task(s)
        PID:1824
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\SysWOW64\schtasks.exe" /Delete /tn "5FOFD9B73D6C-2CRMOI6" /f
        2⤵
          PID:1096
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\SysWOW64\schtasks.exe" /Create /TR "C:\Users\Admin\AppData\Roaming\ARHome\Updater.exe" /SC ONIDLE /TN "5FOFD9B73D6C-2CRMOI6" /I 1 /RL HIGHEST /f
          2⤵
          • Creates scheduled task(s)
          PID:1800
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\SysWOW64\regsvr32.exe" /s "C:\Users\Admin\AppData\Roaming\VolIE\FoxPro_32.dll"
          2⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          • Modifies registry class
          PID:1328
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\SysWOW64\regsvr32.exe" /s "C:\Users\Admin\AppData\Roaming\VolIE\FoxPro_64.dll"
          2⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1872
          • C:\Windows\system32\regsvr32.exe
            /s "C:\Users\Admin\AppData\Roaming\VolIE\FoxPro_64.dll"
            3⤵
            • Registers COM server for autorun
            • Loads dropped DLL
            • Installs/modifies Browser Helper Object
            • Modifies registry class
            PID:948
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\System32\reg.exe" add HKCU\Software\NoVooITSet /v default /t reg_sz /d 1
          2⤵
          • Modifies registry key
          PID:1700
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://www.acdcads.com/aff/thanks/updater-thanks.php?t=1386580451&wti=1000&s=1000&sta=1&av=None
          2⤵
          • Modifies Internet Explorer settings
          PID:1596
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\SysWOW64\schtasks.exe" /Delete /tn "mium0d" /f
          2⤵
            PID:432
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\SysWOW64\schtasks.exe" /Create /TR "C:\Users\Admin\AppData\Roaming\miaul\RJFC.exe" /SC ONLOGON /TN "mium0d" /RL HIGHEST /f
            2⤵
            • Creates scheduled task(s)
            PID:188
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\SysWOW64\schtasks.exe" /Delete /tn "keepup" /f
            2⤵
              PID:1256
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\SysWOW64\schtasks.exe" /Create /TR "C:\Users\Admin\AppData\Roaming\miaul\RJFC.exe" /SC DAILY /TN "keepup" /ST 13:40:00 /du 0024:00 /RI 10 /RL HIGHEST /f
              2⤵
              • Creates scheduled task(s)
              PID:972
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\EB0DEB~1.EXE > nul
              2⤵
                PID:980

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Execution

            Scheduled Task

            1
            T1053

            Persistence

            Registry Run Keys / Startup Folder

            1
            T1060

            Browser Extensions

            1
            T1176

            Scheduled Task

            1
            T1053

            Privilege Escalation

            Scheduled Task

            1
            T1053

            Defense Evasion

            Virtualization/Sandbox Evasion

            2
            T1497

            Modify Registry

            4
            T1112

            Credential Access

            Credentials in Files

            1
            T1081

            Discovery

            Query Registry

            3
            T1012

            Virtualization/Sandbox Evasion

            2
            T1497

            System Information Discovery

            3
            T1082

            Collection

            Data from Local System

            1
            T1005

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\VolIE\FoxPro_32.dll
              Filesize

              182KB

              MD5

              ce31a05ee7c72fea9ea74dcc1a16e8d6

              SHA1

              e524c0f68b735138174137a034f5b5f7878917fb

              SHA256

              1a66dab0e452c64fca4ae8f976c8fd4b790926d246db9de88c95453c7cda255f

              SHA512

              a285766e17888135ba468a69bf460fc03b2fa5fdf64d479e6767e653abe5366dfd5d9ac319f39413559a1e496db18219c8f10fa22dc49fe0fd391c1c82b146c3

            • C:\Users\Admin\AppData\Roaming\VolIE\FoxPro_64.dll
              Filesize

              218KB

              MD5

              50d22dadb851a45d0594f23b23b9bc13

              SHA1

              2e042aed9b0aa3adc3c9e5b9728f6e8ee0c5d2a6

              SHA256

              a742c4aa880a36eac02e3cb2a3d07f0edc5a9f7c94c7c53e88264ec16594a07b

              SHA512

              90f2af018d03db1c9aa17f7fa98b4aa9d39c5a8de4433ab4e305a2212fa53581630c5d39061d22dabb73fe4b848a0d0973357521655b19c700ada574cc71242e

            • \Users\Admin\AppData\Roaming\VolIE\FoxPro_32.dll
              Filesize

              182KB

              MD5

              ce31a05ee7c72fea9ea74dcc1a16e8d6

              SHA1

              e524c0f68b735138174137a034f5b5f7878917fb

              SHA256

              1a66dab0e452c64fca4ae8f976c8fd4b790926d246db9de88c95453c7cda255f

              SHA512

              a285766e17888135ba468a69bf460fc03b2fa5fdf64d479e6767e653abe5366dfd5d9ac319f39413559a1e496db18219c8f10fa22dc49fe0fd391c1c82b146c3

            • \Users\Admin\AppData\Roaming\VolIE\FoxPro_64.dll
              Filesize

              218KB

              MD5

              50d22dadb851a45d0594f23b23b9bc13

              SHA1

              2e042aed9b0aa3adc3c9e5b9728f6e8ee0c5d2a6

              SHA256

              a742c4aa880a36eac02e3cb2a3d07f0edc5a9f7c94c7c53e88264ec16594a07b

              SHA512

              90f2af018d03db1c9aa17f7fa98b4aa9d39c5a8de4433ab4e305a2212fa53581630c5d39061d22dabb73fe4b848a0d0973357521655b19c700ada574cc71242e

            • \Users\Admin\AppData\Roaming\VolIE\FoxPro_64.dll
              Filesize

              218KB

              MD5

              50d22dadb851a45d0594f23b23b9bc13

              SHA1

              2e042aed9b0aa3adc3c9e5b9728f6e8ee0c5d2a6

              SHA256

              a742c4aa880a36eac02e3cb2a3d07f0edc5a9f7c94c7c53e88264ec16594a07b

              SHA512

              90f2af018d03db1c9aa17f7fa98b4aa9d39c5a8de4433ab4e305a2212fa53581630c5d39061d22dabb73fe4b848a0d0973357521655b19c700ada574cc71242e

            • memory/188-79-0x0000000000000000-mapping.dmp
            • memory/432-78-0x0000000000000000-mapping.dmp
            • memory/948-75-0x000007FEFB561000-0x000007FEFB563000-memory.dmp
              Filesize

              8KB

            • memory/948-74-0x0000000000000000-mapping.dmp
            • memory/972-81-0x0000000000000000-mapping.dmp
            • memory/980-82-0x0000000000000000-mapping.dmp
            • memory/992-59-0x0000000000000000-mapping.dmp
            • memory/1000-67-0x0000000000400000-0x00000000017FC000-memory.dmp
              Filesize

              20.0MB

            • memory/1000-56-0x0000000075441000-0x0000000075443000-memory.dmp
              Filesize

              8KB

            • memory/1000-60-0x0000000000400000-0x00000000017FC000-memory.dmp
              Filesize

              20.0MB

            • memory/1000-84-0x0000000076EC0000-0x0000000077040000-memory.dmp
              Filesize

              1.5MB

            • memory/1000-58-0x0000000076EC0000-0x0000000077040000-memory.dmp
              Filesize

              1.5MB

            • memory/1000-66-0x0000000076EC0000-0x0000000077040000-memory.dmp
              Filesize

              1.5MB

            • memory/1000-83-0x0000000000400000-0x00000000017FC000-memory.dmp
              Filesize

              20.0MB

            • memory/1000-55-0x0000000000400000-0x00000000017FC000-memory.dmp
              Filesize

              20.0MB

            • memory/1000-54-0x0000000000400000-0x00000000017FC000-memory.dmp
              Filesize

              20.0MB

            • memory/1096-62-0x0000000000000000-mapping.dmp
            • memory/1256-80-0x0000000000000000-mapping.dmp
            • memory/1328-64-0x0000000000000000-mapping.dmp
            • memory/1700-77-0x0000000000000000-mapping.dmp
            • memory/1800-63-0x0000000000000000-mapping.dmp
            • memory/1824-61-0x0000000000000000-mapping.dmp
            • memory/1872-65-0x0000000000000000-mapping.dmp