Analysis
-
max time kernel
189s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 07:26
Behavioral task
behavioral1
Sample
04d43d6b0a1277e7d1e93415f1aa6a1e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
04d43d6b0a1277e7d1e93415f1aa6a1e.exe
Resource
win10v2004-20221111-en
General
-
Target
04d43d6b0a1277e7d1e93415f1aa6a1e.exe
-
Size
9.9MB
-
MD5
04d43d6b0a1277e7d1e93415f1aa6a1e
-
SHA1
35692f031bf902a62a5b09d4437fe35c7bbdc0b4
-
SHA256
76f4028be569b642d396b8e8936779493280aabcc3329f9058c19e78936c113e
-
SHA512
5c8e27422ee6d73192d1caa3ab1535119e6d2667a28ac6b094a1747ac129e66e2a9122ea3c1f86ad5193b7b2beefa69c50224c558f0400893d729d25c1434dc3
-
SSDEEP
196608:Whld/yJZn3gqkuSJHA2V6dQmRrdA6lakaqdVT8UdyDAS:yldKJZ3zkuIg2odQOlawdqUmAS
Malware Config
Extracted
bitrat
1.38
79.137.206.203:7777
-
communication_password
8e930496927757aac0dbd2438cb3f4f6
-
install_dir
%APPDATA%
-
install_file
ROCKEEETS
-
tor_process
tls
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
INST.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ INST.exe -
Executes dropped EXE 1 IoCs
Processes:
INST.exepid process 3660 INST.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
INST.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion INST.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion INST.exe -
Loads dropped DLL 2 IoCs
Processes:
04d43d6b0a1277e7d1e93415f1aa6a1e.exepid process 4868 04d43d6b0a1277e7d1e93415f1aa6a1e.exe 4868 04d43d6b0a1277e7d1e93415f1aa6a1e.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\INST.exe themida C:\Users\Admin\AppData\Local\Temp\INST.exe themida behavioral2/memory/3660-143-0x00000000004A0000-0x0000000000F55000-memory.dmp themida behavioral2/memory/3660-144-0x00000000004A0000-0x0000000000F55000-memory.dmp themida behavioral2/memory/3660-145-0x00000000004A0000-0x0000000000F55000-memory.dmp themida behavioral2/memory/3660-146-0x00000000004A0000-0x0000000000F55000-memory.dmp themida behavioral2/memory/3660-148-0x00000000004A0000-0x0000000000F55000-memory.dmp themida behavioral2/memory/3660-149-0x00000000004A0000-0x0000000000F55000-memory.dmp themida behavioral2/memory/3660-150-0x00000000004A0000-0x0000000000F55000-memory.dmp themida behavioral2/memory/3660-151-0x00000000004A0000-0x0000000000F55000-memory.dmp themida behavioral2/memory/3660-154-0x00000000004A0000-0x0000000000F55000-memory.dmp themida -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
INST.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ROCKEEETS = "C:\\Users\\Admin\\AppData\\Local\\%APPDATA%\\ROCKEEETS䄀" INST.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ROCKEEETS = "C:\\Users\\Admin\\AppData\\Local\\%APPDATA%\\ROCKEEETS䜀" INST.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ROCKEEETS = "C:\\Users\\Admin\\AppData\\Local\\%APPDATA%\\ROCKEEETSȀ" INST.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ROCKEEETS = "C:\\Users\\Admin\\AppData\\Local\\%APPDATA%\\ROCKEEETS餀" INST.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ROCKEEETS = "C:\\Users\\Admin\\AppData\\Local\\%APPDATA%\\ROCKEEETS" INST.exe -
Processes:
INST.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA INST.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
INST.exepid process 3660 INST.exe 3660 INST.exe 3660 INST.exe 3660 INST.exe 3660 INST.exe 3660 INST.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
INST.exedescription pid process Token: SeShutdownPrivilege 3660 INST.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
INST.exepid process 3660 INST.exe 3660 INST.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
04d43d6b0a1277e7d1e93415f1aa6a1e.exe04d43d6b0a1277e7d1e93415f1aa6a1e.execmd.exedescription pid process target process PID 1516 wrote to memory of 4868 1516 04d43d6b0a1277e7d1e93415f1aa6a1e.exe 04d43d6b0a1277e7d1e93415f1aa6a1e.exe PID 1516 wrote to memory of 4868 1516 04d43d6b0a1277e7d1e93415f1aa6a1e.exe 04d43d6b0a1277e7d1e93415f1aa6a1e.exe PID 4868 wrote to memory of 2040 4868 04d43d6b0a1277e7d1e93415f1aa6a1e.exe cmd.exe PID 4868 wrote to memory of 2040 4868 04d43d6b0a1277e7d1e93415f1aa6a1e.exe cmd.exe PID 4868 wrote to memory of 1076 4868 04d43d6b0a1277e7d1e93415f1aa6a1e.exe cmd.exe PID 4868 wrote to memory of 1076 4868 04d43d6b0a1277e7d1e93415f1aa6a1e.exe cmd.exe PID 1076 wrote to memory of 3660 1076 cmd.exe INST.exe PID 1076 wrote to memory of 3660 1076 cmd.exe INST.exe PID 1076 wrote to memory of 3660 1076 cmd.exe INST.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\04d43d6b0a1277e7d1e93415f1aa6a1e.exe"C:\Users\Admin\AppData\Local\Temp\04d43d6b0a1277e7d1e93415f1aa6a1e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\04d43d6b0a1277e7d1e93415f1aa6a1e.exe"C:\Users\Admin\AppData\Local\Temp\04d43d6b0a1277e7d1e93415f1aa6a1e.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SYSTEM32\cmd.execmd /c echo %temp%3⤵PID:2040
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\INST.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\INST.exeC:\Users\Admin\AppData\Local\Temp\INST.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3660
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5c9acdffcc9f0b3e090c3d0db43d94b72
SHA1fc2a610949cc0c95d57da32015bf91a60dbfae6c
SHA2567f331d1087613c8fc17e827c391f18c93532ab3f98d5cf99321c14e53bb15859
SHA512e1bba90fee8a191167ae9825cb1c458fb891deadabd2fa1d0f9a8a1d422fd902bb7ba88b7ae3748be8f16f71cc0dbbd1d09ed7180ffcbdd5e4781be6ad8ec891
-
Filesize
4.3MB
MD5c9acdffcc9f0b3e090c3d0db43d94b72
SHA1fc2a610949cc0c95d57da32015bf91a60dbfae6c
SHA2567f331d1087613c8fc17e827c391f18c93532ab3f98d5cf99321c14e53bb15859
SHA512e1bba90fee8a191167ae9825cb1c458fb891deadabd2fa1d0f9a8a1d422fd902bb7ba88b7ae3748be8f16f71cc0dbbd1d09ed7180ffcbdd5e4781be6ad8ec891
-
Filesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
Filesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
Filesize
1.0MB
MD59a712ff5a82ab516664ee4449d7a8c69
SHA13600b3ef4368955e686e76e674f6f6a86769b654
SHA25663e2585e157512983764fc113b4ce214834f60cce9f0b97167f85ad1e28e0fc0
SHA5123c9460c3ae84348d3bd7f3f14482e3b27b38d016c9c476688cf1f5454d90244d73d412703758eaecfd8c87d561e2fa556505d7179ce11b5ee55b191d5740f9da
-
Filesize
4.3MB
MD5342ba224fe440b585db4e9d2fc9f86cd
SHA1bfa3d380231166f7c2603ca89a984a5cad9752ab
SHA256cdb8158dcf4f10517bd73e1334fc354fd98180d4455f29e3df2b0aa699fa2432
SHA512daa990ff3770a39b778f672f2596ab4050bff9b16bb2222e5712327df82d18f39ac5100e3b592a5db9e88302e6e94c06881fbf61431e7670ff287f7f222254c1
-
Filesize
4.3MB
MD5342ba224fe440b585db4e9d2fc9f86cd
SHA1bfa3d380231166f7c2603ca89a984a5cad9752ab
SHA256cdb8158dcf4f10517bd73e1334fc354fd98180d4455f29e3df2b0aa699fa2432
SHA512daa990ff3770a39b778f672f2596ab4050bff9b16bb2222e5712327df82d18f39ac5100e3b592a5db9e88302e6e94c06881fbf61431e7670ff287f7f222254c1