Analysis
-
max time kernel
175s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe
Resource
win10v2004-20220812-en
General
-
Target
d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe
-
Size
155KB
-
MD5
e51e3d5711bb87b76d703e10c4bad01a
-
SHA1
21410b5fe87e9c8394f535485cc92d00ae3b795a
-
SHA256
d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1
-
SHA512
32a4491e4f8c86dfb6e156f61440a8a7ba297ffb1b484ae3ab8766efb20b3b2a6d87ae35ece51dd4c781be1e5d2666d793e5eb8a74637b478b376a7fe2881b4a
-
SSDEEP
3072:lM+9i7SFCIXJZtWrl7fZt0Jhko4hMlFuWUwwMzhUmjapUmDV5jnQDntiPmowOv:lMTCPsBNtI4hjrbEtjRm7jnAtQm98
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe -
Loads dropped DLL 2 IoCs
pid Process 4936 d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe 4936 d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4936 set thread context of 4908 4936 d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe 78 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4908 d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4936 wrote to memory of 4908 4936 d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe 78 PID 4936 wrote to memory of 4908 4936 d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe 78 PID 4936 wrote to memory of 4908 4936 d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe 78 PID 4936 wrote to memory of 4908 4936 d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe 78 PID 4936 wrote to memory of 4908 4936 d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe 78 PID 4936 wrote to memory of 4908 4936 d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe 78 PID 4936 wrote to memory of 4908 4936 d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe 78 PID 4936 wrote to memory of 4908 4936 d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe 78 PID 4936 wrote to memory of 4908 4936 d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe"C:\Users\Admin\AppData\Local\Temp\d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe"C:\Users\Admin\AppData\Local\Temp\d5123091b0a772e949619e61a8bd5ee354d50bab994bb8d6c5bcaa9bc24fbef1.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD56a4a2054a2e8cc16e4f176784d987c19
SHA16e4dde3b946dd544b006cf3a5195aa4e7b787cb3
SHA2565422a9df39a0127b73a37958f8c924624acbdfdb912073f2684c890cce6417e2
SHA51291f3b3d1face7101de54a16e332aa00bf3d6458754925cca1190787539a617c40f47bb7f2feb003002efbb2a9d0d01dc0f0d825479696091ae5f4811eb801683
-
Filesize
60KB
MD56a4a2054a2e8cc16e4f176784d987c19
SHA16e4dde3b946dd544b006cf3a5195aa4e7b787cb3
SHA2565422a9df39a0127b73a37958f8c924624acbdfdb912073f2684c890cce6417e2
SHA51291f3b3d1face7101de54a16e332aa00bf3d6458754925cca1190787539a617c40f47bb7f2feb003002efbb2a9d0d01dc0f0d825479696091ae5f4811eb801683