Analysis

  • max time kernel
    131s
  • max time network
    163s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 06:52

General

  • Target

    e78811d76d6c154f8c3be8339339d5b460ae75e20c30d5f8359b5ac62974dd22.exe

  • Size

    1.8MB

  • MD5

    e4228a678244df4158509751680f4585

  • SHA1

    47d0d9f3d70461d058090843f0e93a3a8fd93f10

  • SHA256

    e78811d76d6c154f8c3be8339339d5b460ae75e20c30d5f8359b5ac62974dd22

  • SHA512

    6f34ae2aec27f5b23f5bbe05df1dcbb65c5409a9b5dde11fb7b356a4b56ea65245fef1281482c7208b1096e97ca59417b42adac0af94ba117be356b4f431e493

  • SSDEEP

    49152:SsDsqkEOVf7bZWVg4sZi2DLOFKMsoHIW5vVsUOO:QqSZRWO8xvsyvVsfO

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 14 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 5 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e78811d76d6c154f8c3be8339339d5b460ae75e20c30d5f8359b5ac62974dd22.exe
    "C:\Users\Admin\AppData\Local\Temp\e78811d76d6c154f8c3be8339339d5b460ae75e20c30d5f8359b5ac62974dd22.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1604
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\SysWOW64\schtasks.exe" /Delete /tn "4CEFD9B73D6C-1CRMOI2" /f
      2⤵
        PID:472
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\SysWOW64\schtasks.exe" /Create /TR "C:\Users\Admin\AppData\Roaming\ARHome\Updater.exe" /SC DAILY /TN "4CEFD9B73D6C-1CRMOI2" /ST 19:09:00 /du 0024:00 /RI 360 /RL HIGHEST /f
        2⤵
        • Creates scheduled task(s)
        PID:1324
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\SysWOW64\schtasks.exe" /Delete /tn "5FOFD9B73D6C-2CRMOI6" /f
        2⤵
          PID:1356
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\SysWOW64\schtasks.exe" /Create /TR "C:\Users\Admin\AppData\Roaming\ARHome\Updater.exe" /SC ONIDLE /TN "5FOFD9B73D6C-2CRMOI6" /I 1 /RL HIGHEST /f
          2⤵
          • Creates scheduled task(s)
          PID:1248
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\SysWOW64\regsvr32.exe" /s "C:\Users\Admin\AppData\Roaming\VolIE\FoxPro_32.dll"
          2⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          • Modifies registry class
          PID:1756
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\SysWOW64\regsvr32.exe" /s "C:\Users\Admin\AppData\Roaming\VolIE\FoxPro_64.dll"
          2⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1760
          • C:\Windows\system32\regsvr32.exe
            /s "C:\Users\Admin\AppData\Roaming\VolIE\FoxPro_64.dll"
            3⤵
            • Registers COM server for autorun
            • Loads dropped DLL
            • Installs/modifies Browser Helper Object
            • Modifies registry class
            PID:1496
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\System32\reg.exe" add HKCU\Software\NoVooITSet /v default /t reg_sz /d 1
          2⤵
          • Modifies registry key
          PID:1544
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://www.acdcads.com/aff/thanks/updater-thanks.php?t=1386580451&wti=1000&s=1000&sta=1&av=None
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:824
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:824 CREDAT:275457 /prefetch:2
            3⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1628
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\SysWOW64\schtasks.exe" /Delete /tn "mium0d" /f
          2⤵
            PID:1504
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\SysWOW64\schtasks.exe" /Create /TR "C:\Users\Admin\AppData\Roaming\miaul\RJFC.exe" /SC ONLOGON /TN "mium0d" /RL HIGHEST /f
            2⤵
            • Creates scheduled task(s)
            PID:584
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\SysWOW64\schtasks.exe" /Delete /tn "keepup" /f
            2⤵
              PID:2008
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\SysWOW64\schtasks.exe" /Create /TR "C:\Users\Admin\AppData\Roaming\miaul\RJFC.exe" /SC DAILY /TN "keepup" /ST 13:38:00 /du 0024:00 /RI 10 /RL HIGHEST /f
              2⤵
              • Creates scheduled task(s)
              PID:1216
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\E78811~1.EXE > nul
              2⤵
                PID:860

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Execution

            Scheduled Task

            1
            T1053

            Persistence

            Registry Run Keys / Startup Folder

            1
            T1060

            Browser Extensions

            1
            T1176

            Scheduled Task

            1
            T1053

            Privilege Escalation

            Scheduled Task

            1
            T1053

            Defense Evasion

            Virtualization/Sandbox Evasion

            2
            T1497

            Modify Registry

            4
            T1112

            Credential Access

            Credentials in Files

            1
            T1081

            Discovery

            Query Registry

            3
            T1012

            Virtualization/Sandbox Evasion

            2
            T1497

            System Information Discovery

            3
            T1082

            Collection

            Data from Local System

            1
            T1005

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IPR9Y7WK.txt
              Filesize

              603B

              MD5

              442f3c1a5f6279d458031aea71fc20de

              SHA1

              0bad23bdf5416cc80bdde0b1cd35c0073f1f4968

              SHA256

              d7eb5474bfaa6ce058cd2db13ece513d6eafc64045faff178a7a86fd84939330

              SHA512

              5227b7433060ace6eb1f380d75b65e58943bfb283be2c86d1521fe60c1b9063f0eddf93c8af6903dbd5a516df6ca7ce9229757786c4a5427d9a4e07e31e3e0b5

            • C:\Users\Admin\AppData\Roaming\VolIE\FoxPro_32.dll
              Filesize

              182KB

              MD5

              ce31a05ee7c72fea9ea74dcc1a16e8d6

              SHA1

              e524c0f68b735138174137a034f5b5f7878917fb

              SHA256

              1a66dab0e452c64fca4ae8f976c8fd4b790926d246db9de88c95453c7cda255f

              SHA512

              a285766e17888135ba468a69bf460fc03b2fa5fdf64d479e6767e653abe5366dfd5d9ac319f39413559a1e496db18219c8f10fa22dc49fe0fd391c1c82b146c3

            • C:\Users\Admin\AppData\Roaming\VolIE\FoxPro_64.dll
              Filesize

              218KB

              MD5

              50d22dadb851a45d0594f23b23b9bc13

              SHA1

              2e042aed9b0aa3adc3c9e5b9728f6e8ee0c5d2a6

              SHA256

              a742c4aa880a36eac02e3cb2a3d07f0edc5a9f7c94c7c53e88264ec16594a07b

              SHA512

              90f2af018d03db1c9aa17f7fa98b4aa9d39c5a8de4433ab4e305a2212fa53581630c5d39061d22dabb73fe4b848a0d0973357521655b19c700ada574cc71242e

            • \Users\Admin\AppData\Roaming\VolIE\FoxPro_32.dll
              Filesize

              182KB

              MD5

              ce31a05ee7c72fea9ea74dcc1a16e8d6

              SHA1

              e524c0f68b735138174137a034f5b5f7878917fb

              SHA256

              1a66dab0e452c64fca4ae8f976c8fd4b790926d246db9de88c95453c7cda255f

              SHA512

              a285766e17888135ba468a69bf460fc03b2fa5fdf64d479e6767e653abe5366dfd5d9ac319f39413559a1e496db18219c8f10fa22dc49fe0fd391c1c82b146c3

            • \Users\Admin\AppData\Roaming\VolIE\FoxPro_64.dll
              Filesize

              218KB

              MD5

              50d22dadb851a45d0594f23b23b9bc13

              SHA1

              2e042aed9b0aa3adc3c9e5b9728f6e8ee0c5d2a6

              SHA256

              a742c4aa880a36eac02e3cb2a3d07f0edc5a9f7c94c7c53e88264ec16594a07b

              SHA512

              90f2af018d03db1c9aa17f7fa98b4aa9d39c5a8de4433ab4e305a2212fa53581630c5d39061d22dabb73fe4b848a0d0973357521655b19c700ada574cc71242e

            • \Users\Admin\AppData\Roaming\VolIE\FoxPro_64.dll
              Filesize

              218KB

              MD5

              50d22dadb851a45d0594f23b23b9bc13

              SHA1

              2e042aed9b0aa3adc3c9e5b9728f6e8ee0c5d2a6

              SHA256

              a742c4aa880a36eac02e3cb2a3d07f0edc5a9f7c94c7c53e88264ec16594a07b

              SHA512

              90f2af018d03db1c9aa17f7fa98b4aa9d39c5a8de4433ab4e305a2212fa53581630c5d39061d22dabb73fe4b848a0d0973357521655b19c700ada574cc71242e

            • memory/472-59-0x0000000000000000-mapping.dmp
            • memory/584-76-0x0000000000000000-mapping.dmp
            • memory/860-79-0x0000000000000000-mapping.dmp
            • memory/1216-78-0x0000000000000000-mapping.dmp
            • memory/1248-62-0x0000000000000000-mapping.dmp
            • memory/1324-60-0x0000000000000000-mapping.dmp
            • memory/1356-61-0x0000000000000000-mapping.dmp
            • memory/1496-71-0x0000000000000000-mapping.dmp
            • memory/1496-73-0x000007FEFC481000-0x000007FEFC483000-memory.dmp
              Filesize

              8KB

            • memory/1504-75-0x0000000000000000-mapping.dmp
            • memory/1544-72-0x0000000000000000-mapping.dmp
            • memory/1604-54-0x0000000000400000-0x00000000017FB000-memory.dmp
              Filesize

              20.0MB

            • memory/1604-58-0x0000000000400000-0x00000000017FB000-memory.dmp
              Filesize

              20.0MB

            • memory/1604-57-0x0000000077E10000-0x0000000077F90000-memory.dmp
              Filesize

              1.5MB

            • memory/1604-80-0x0000000000400000-0x00000000017FB000-memory.dmp
              Filesize

              20.0MB

            • memory/1604-81-0x0000000077E10000-0x0000000077F90000-memory.dmp
              Filesize

              1.5MB

            • memory/1604-55-0x0000000076DC1000-0x0000000076DC3000-memory.dmp
              Filesize

              8KB

            • memory/1756-63-0x0000000000000000-mapping.dmp
            • memory/1760-64-0x0000000000000000-mapping.dmp
            • memory/2008-77-0x0000000000000000-mapping.dmp