Resubmissions

31/05/2023, 15:39

230531-s3qrvagc31 9

31/05/2023, 11:18

230531-neex8aee66 9

27/11/2022, 11:41

221127-ntgeladh62 9

Analysis

  • max time kernel
    180s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 11:41

General

  • Target

    5b7e022f5009004985b34cf091d06752c765a25b445a46050eef51a17be8267d.exe

  • Size

    2.2MB

  • MD5

    55c447191d9566c7442e25c4caf0d2fe

  • SHA1

    646762cee3a5caab9accd21efcb100cd49b8ef8a

  • SHA256

    5b7e022f5009004985b34cf091d06752c765a25b445a46050eef51a17be8267d

  • SHA512

    9da8d4eb744308253f9befc238f4d1bd3122e06aa578b50ad2d27cb7a11d76fd1a95428df66ef287783139e5d3c8bf10d6fca6833867f8285cd06637843faa7e

  • SSDEEP

    49152:ZQwS6fiVzAdAqfR8K+CQmh2l2qf4LSQmCRnXhRaNQRWGNfbzQUo:+N6aVzAyqfnzQf4LptnXasW4fwU

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b7e022f5009004985b34cf091d06752c765a25b445a46050eef51a17be8267d.exe
    "C:\Users\Admin\AppData\Local\Temp\5b7e022f5009004985b34cf091d06752c765a25b445a46050eef51a17be8267d.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:420
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\system32\schtasks.exe" /delete /TN Microsoft\Windows\Shell\Init /F
      2⤵
        PID:1512
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /create /F /sc onstart /tn Microsoft\Windows\Shell\Init /tr "\"C:\Windows\System\7c9FmS3\79O0Z.exe\"" /ru system
        2⤵
        • Creates scheduled task(s)
        PID:1972
      • C:\Windows\System\7c9FmS3\79O0Z.exe
        "C:\Windows\System\7c9FmS3\79O0Z.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        PID:2904
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\5B7E02~1.EXE >> NUL
        2⤵
          PID:3844

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\175B.tmp

        Filesize

        106KB

        MD5

        d6ce4b6db8407ca80193ede96d812bb7

        SHA1

        0a181d703e3adf1b3b9f043559e1952446a0b0cd

        SHA256

        7127ea6a185af63fc77fa2a7f87605d981a15c90277eaa3e9899d333e2e108e2

        SHA512

        25a1e5f60571486c1fd23dde44ca565a3bac051542831d9a24484a9c160e5ca9322daa376ab3a5bdc397113b61227955d4d951987cc01e9b18556f3513a9ab87

      • C:\Users\Admin\AppData\Local\Temp\FAE5.tmp

        Filesize

        106KB

        MD5

        d6ce4b6db8407ca80193ede96d812bb7

        SHA1

        0a181d703e3adf1b3b9f043559e1952446a0b0cd

        SHA256

        7127ea6a185af63fc77fa2a7f87605d981a15c90277eaa3e9899d333e2e108e2

        SHA512

        25a1e5f60571486c1fd23dde44ca565a3bac051542831d9a24484a9c160e5ca9322daa376ab3a5bdc397113b61227955d4d951987cc01e9b18556f3513a9ab87

      • C:\Windows\System\7c9FmS3\79O0Z.exe

        Filesize

        2.2MB

        MD5

        55c447191d9566c7442e25c4caf0d2fe

        SHA1

        646762cee3a5caab9accd21efcb100cd49b8ef8a

        SHA256

        5b7e022f5009004985b34cf091d06752c765a25b445a46050eef51a17be8267d

        SHA512

        9da8d4eb744308253f9befc238f4d1bd3122e06aa578b50ad2d27cb7a11d76fd1a95428df66ef287783139e5d3c8bf10d6fca6833867f8285cd06637843faa7e

      • C:\Windows\System\7c9FmS3\79O0Z.exe

        Filesize

        2.2MB

        MD5

        55c447191d9566c7442e25c4caf0d2fe

        SHA1

        646762cee3a5caab9accd21efcb100cd49b8ef8a

        SHA256

        5b7e022f5009004985b34cf091d06752c765a25b445a46050eef51a17be8267d

        SHA512

        9da8d4eb744308253f9befc238f4d1bd3122e06aa578b50ad2d27cb7a11d76fd1a95428df66ef287783139e5d3c8bf10d6fca6833867f8285cd06637843faa7e

      • memory/420-143-0x0000000000400000-0x00000000008F8000-memory.dmp

        Filesize

        5.0MB

      • memory/420-132-0x0000000000400000-0x00000000008F8000-memory.dmp

        Filesize

        5.0MB

      • memory/420-134-0x0000000000400000-0x00000000008F8000-memory.dmp

        Filesize

        5.0MB

      • memory/420-135-0x0000000000400000-0x00000000008F8000-memory.dmp

        Filesize

        5.0MB

      • memory/420-133-0x0000000000400000-0x00000000008F8000-memory.dmp

        Filesize

        5.0MB

      • memory/2904-144-0x0000000000400000-0x00000000008F8000-memory.dmp

        Filesize

        5.0MB

      • memory/2904-145-0x0000000000400000-0x00000000008F8000-memory.dmp

        Filesize

        5.0MB

      • memory/2904-146-0x0000000000400000-0x00000000008F8000-memory.dmp

        Filesize

        5.0MB

      • memory/2904-147-0x0000000000400000-0x00000000008F8000-memory.dmp

        Filesize

        5.0MB