Analysis

  • max time kernel
    155s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 12:07

General

  • Target

    7bed3ad93b19db82b353027a3faa0d7c73a08a49fbfff9991b71e4c0579c6dfe.exe

  • Size

    8.2MB

  • MD5

    5314f9b66878db3fc8733be0a5890d7f

  • SHA1

    2fda2c33e079041a9acbebe186bd6db616c7be0d

  • SHA256

    7bed3ad93b19db82b353027a3faa0d7c73a08a49fbfff9991b71e4c0579c6dfe

  • SHA512

    4bc72d360f906828537e5a0321bec74d97d53537fe720b5a7f0ab508dc3b887b6e7c6cb7ee5a387d079357d50ddee8baab768573d5a939a5ac385b7a429d1bb4

  • SSDEEP

    98304:Tg8NoaGCGg0pL2OIUvKZa3ZnaGgux4QrPSNAPzpUCu+8PCvOLMtqlrynFQyfoIod:TN1m9vGapaGHrXzpUCelcIkPQIot96

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Executes dropped EXE 3 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 5 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7bed3ad93b19db82b353027a3faa0d7c73a08a49fbfff9991b71e4c0579c6dfe.exe
    "C:\Users\Admin\AppData\Local\Temp\7bed3ad93b19db82b353027a3faa0d7c73a08a49fbfff9991b71e4c0579c6dfe.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Users\Admin\AppData\Local\Temp\£°£¶£°£¶.exe
      "C:\Users\Admin\AppData\Local\Temp\£°£¶£°£¶.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:328
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.166wg.net/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:568
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:568 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1784
    • C:\Users\Admin\AppData\Local\Temp\dns.exe
      "C:\Users\Admin\AppData\Local\Temp\dns.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:568
      • C:\Users\Admin\AppData\Local\Temp\~hwxgips.vbe
        "C:\Users\Admin\AppData\Local\Temp\~hwxgips.vbe" "C:\Windows\SysWOW64\dns.vbe"
        3⤵
        • Executes dropped EXE
        PID:468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dns.exe

    Filesize

    411KB

    MD5

    e45e27446fe4bb66a6a9226414794ea0

    SHA1

    5e0676807b5ce74748e2201d861e7a16e855c448

    SHA256

    042fe3dc806396e06bbe307edfad4de4728f5af72820ae2e3fc4a22d63644bf5

    SHA512

    b1fc39be0b645272446e01a9bb17814c93299363335856a1154c331c6cd95a07270a04cdf514755ca9851acb6377a984084e6efa991a7a30a3997171baeba605

  • C:\Users\Admin\AppData\Local\Temp\dns.exe

    Filesize

    411KB

    MD5

    e45e27446fe4bb66a6a9226414794ea0

    SHA1

    5e0676807b5ce74748e2201d861e7a16e855c448

    SHA256

    042fe3dc806396e06bbe307edfad4de4728f5af72820ae2e3fc4a22d63644bf5

    SHA512

    b1fc39be0b645272446e01a9bb17814c93299363335856a1154c331c6cd95a07270a04cdf514755ca9851acb6377a984084e6efa991a7a30a3997171baeba605

  • C:\Users\Admin\AppData\Local\Temp\~hwxgips.vbe

    Filesize

    138KB

    MD5

    d1ab72db2bedd2f255d35da3da0d4b16

    SHA1

    860265276b29b42b8c4b077e5c651def9c81b6e9

    SHA256

    047f3c5a7ab0ea05f35b2ca8037bf62dd4228786d07707064dbd0d46569305d0

    SHA512

    b46830742eebc85e731c14f7dc72cc6734fcc79aab46f6080c95589c438c4cca0a069027badc0a8a78e4deeb31cdf38df3d63db679b793212a32efdad7bb8185

  • C:\Users\Admin\AppData\Local\Temp\~hwxgips.vbe

    Filesize

    138KB

    MD5

    d1ab72db2bedd2f255d35da3da0d4b16

    SHA1

    860265276b29b42b8c4b077e5c651def9c81b6e9

    SHA256

    047f3c5a7ab0ea05f35b2ca8037bf62dd4228786d07707064dbd0d46569305d0

    SHA512

    b46830742eebc85e731c14f7dc72cc6734fcc79aab46f6080c95589c438c4cca0a069027badc0a8a78e4deeb31cdf38df3d63db679b793212a32efdad7bb8185

  • C:\Users\Admin\AppData\Local\Temp\£°£¶£°£¶.exe

    Filesize

    7.8MB

    MD5

    16ff4b62d43bbf6a9f28cbcda002a7c2

    SHA1

    eee991d06c2e0b512a226e05440c8026f8d49e89

    SHA256

    bba918fefc6eb57ea5bde40b4744888a2dee4751cdf559b525073677e1643ec7

    SHA512

    5fd0467660983360dbe929b19e9abef3ae4dc57da80c0c8b62f58bb98bd84af520c7993360ce4d1ad05770c4e4f05dea5f9cc47a987e263c82b32fbe5929d8cd

  • C:\Users\Admin\AppData\Local\Temp\£°£¶£°£¶.exe

    Filesize

    7.8MB

    MD5

    16ff4b62d43bbf6a9f28cbcda002a7c2

    SHA1

    eee991d06c2e0b512a226e05440c8026f8d49e89

    SHA256

    bba918fefc6eb57ea5bde40b4744888a2dee4751cdf559b525073677e1643ec7

    SHA512

    5fd0467660983360dbe929b19e9abef3ae4dc57da80c0c8b62f58bb98bd84af520c7993360ce4d1ad05770c4e4f05dea5f9cc47a987e263c82b32fbe5929d8cd

  • C:\Windows\SysWOW64\dns.vbe

    Filesize

    752B

    MD5

    4d566e5d0f61678147812b9f3e677c42

    SHA1

    53646b8d2239a31f8ab173b75356fe2aabdd1087

    SHA256

    426a59e454b8b7329f3dbb356bbdb5e3cbe5e8bc97abfe5b8c8f63a85b30e3ff

    SHA512

    ad69478b4a0b3148436da1e315ce7f9115284ef2b7d70bbc7bd7745852f65db126ad6a37b4d3977c482af6405b03077103059146ad171eab430632725217d70d

  • \Users\Admin\AppData\Local\Temp\dns.exe

    Filesize

    411KB

    MD5

    e45e27446fe4bb66a6a9226414794ea0

    SHA1

    5e0676807b5ce74748e2201d861e7a16e855c448

    SHA256

    042fe3dc806396e06bbe307edfad4de4728f5af72820ae2e3fc4a22d63644bf5

    SHA512

    b1fc39be0b645272446e01a9bb17814c93299363335856a1154c331c6cd95a07270a04cdf514755ca9851acb6377a984084e6efa991a7a30a3997171baeba605

  • \Users\Admin\AppData\Local\Temp\~hwxgips.vbe

    Filesize

    138KB

    MD5

    d1ab72db2bedd2f255d35da3da0d4b16

    SHA1

    860265276b29b42b8c4b077e5c651def9c81b6e9

    SHA256

    047f3c5a7ab0ea05f35b2ca8037bf62dd4228786d07707064dbd0d46569305d0

    SHA512

    b46830742eebc85e731c14f7dc72cc6734fcc79aab46f6080c95589c438c4cca0a069027badc0a8a78e4deeb31cdf38df3d63db679b793212a32efdad7bb8185

  • \Users\Admin\AppData\Local\Temp\~hwxgips.vbe

    Filesize

    138KB

    MD5

    d1ab72db2bedd2f255d35da3da0d4b16

    SHA1

    860265276b29b42b8c4b077e5c651def9c81b6e9

    SHA256

    047f3c5a7ab0ea05f35b2ca8037bf62dd4228786d07707064dbd0d46569305d0

    SHA512

    b46830742eebc85e731c14f7dc72cc6734fcc79aab46f6080c95589c438c4cca0a069027badc0a8a78e4deeb31cdf38df3d63db679b793212a32efdad7bb8185

  • \Users\Admin\AppData\Local\Temp\£°£¶£°£¶.exe

    Filesize

    7.8MB

    MD5

    16ff4b62d43bbf6a9f28cbcda002a7c2

    SHA1

    eee991d06c2e0b512a226e05440c8026f8d49e89

    SHA256

    bba918fefc6eb57ea5bde40b4744888a2dee4751cdf559b525073677e1643ec7

    SHA512

    5fd0467660983360dbe929b19e9abef3ae4dc57da80c0c8b62f58bb98bd84af520c7993360ce4d1ad05770c4e4f05dea5f9cc47a987e263c82b32fbe5929d8cd

  • \Users\Admin\AppData\Local\Temp\£°£¶£°£¶.exe

    Filesize

    7.8MB

    MD5

    16ff4b62d43bbf6a9f28cbcda002a7c2

    SHA1

    eee991d06c2e0b512a226e05440c8026f8d49e89

    SHA256

    bba918fefc6eb57ea5bde40b4744888a2dee4751cdf559b525073677e1643ec7

    SHA512

    5fd0467660983360dbe929b19e9abef3ae4dc57da80c0c8b62f58bb98bd84af520c7993360ce4d1ad05770c4e4f05dea5f9cc47a987e263c82b32fbe5929d8cd

  • memory/328-75-0x0000000077450000-0x00000000775D0000-memory.dmp

    Filesize

    1.5MB

  • memory/328-79-0x0000000000400000-0x0000000000F43000-memory.dmp

    Filesize

    11.3MB

  • memory/328-65-0x0000000000400000-0x0000000000F43000-memory.dmp

    Filesize

    11.3MB

  • memory/328-81-0x0000000000400000-0x0000000000F43000-memory.dmp

    Filesize

    11.3MB

  • memory/328-80-0x0000000077450000-0x00000000775D0000-memory.dmp

    Filesize

    1.5MB

  • memory/328-78-0x0000000005230000-0x00000000052A1000-memory.dmp

    Filesize

    452KB

  • memory/328-76-0x0000000005230000-0x00000000052A1000-memory.dmp

    Filesize

    452KB

  • memory/328-77-0x0000000000400000-0x0000000000F43000-memory.dmp

    Filesize

    11.3MB

  • memory/568-73-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/568-63-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/1428-54-0x0000000075591000-0x0000000075593000-memory.dmp

    Filesize

    8KB