Analysis
-
max time kernel
159s -
max time network
297s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21-12-2022 22:17
Static task
static1
Behavioral task
behavioral1
Sample
57fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c.exe
Resource
win7-20221111-en
General
-
Target
57fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c.exe
-
Size
2.2MB
-
MD5
f6232a2ae8c13154c0b635900e5d5606
-
SHA1
3dc773c2edc6dacb581be6ac37e404a091bae760
-
SHA256
57fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c
-
SHA512
8902664b973efd46e56d12f151257bd8988d79ecafa32ee136b171979dac138b7ee98e45b9361f499916013a1fd37572360e6f88cc1fa24d81617328dd6d2ebd
-
SSDEEP
49152:SIaJIbJosoFb+OX3z1Ek8fBI361rMKuWjRzyzSbxkq1DfDE:5aJIbKVFbd61rMKuWNyzykq1jI
Malware Config
Extracted
systembc
cryptotab.me:4001
portexcloud.xyz:4001
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
Processes:
57fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c.exestewbui.exestewbui.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 57fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ stewbui.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ stewbui.exe -
Executes dropped EXE 2 IoCs
Processes:
stewbui.exestewbui.exepid process 584 stewbui.exe 1564 stewbui.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
57fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c.exestewbui.exestewbui.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 57fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 57fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion stewbui.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion stewbui.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion stewbui.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion stewbui.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
57fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c.exestewbui.exestewbui.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Wine 57fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c.exe Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Wine stewbui.exe Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Wine stewbui.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
57fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c.exestewbui.exestewbui.exepid process 1348 57fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c.exe 584 stewbui.exe 1564 stewbui.exe -
Drops file in Windows directory 2 IoCs
Processes:
57fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c.exedescription ioc process File opened for modification C:\Windows\Tasks\stewbui.job 57fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c.exe File created C:\Windows\Tasks\stewbui.job 57fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
57fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c.exestewbui.exestewbui.exepid process 1348 57fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c.exe 1348 57fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c.exe 584 stewbui.exe 1564 stewbui.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
taskeng.exedescription pid process target process PID 1144 wrote to memory of 584 1144 taskeng.exe stewbui.exe PID 1144 wrote to memory of 584 1144 taskeng.exe stewbui.exe PID 1144 wrote to memory of 584 1144 taskeng.exe stewbui.exe PID 1144 wrote to memory of 584 1144 taskeng.exe stewbui.exe PID 1144 wrote to memory of 1564 1144 taskeng.exe stewbui.exe PID 1144 wrote to memory of 1564 1144 taskeng.exe stewbui.exe PID 1144 wrote to memory of 1564 1144 taskeng.exe stewbui.exe PID 1144 wrote to memory of 1564 1144 taskeng.exe stewbui.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c.exe"C:\Users\Admin\AppData\Local\Temp\57fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\taskeng.exetaskeng.exe {C5309EB0-7549-4244-8B2C-77E388133D62} S-1-5-21-3406023954-474543476-3319432036-1000:VUIIVLGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\gpas\stewbui.exeC:\ProgramData\gpas\stewbui.exe start22⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\ProgramData\gpas\stewbui.exeC:\ProgramData\gpas\stewbui.exe start22⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\gpas\stewbui.exeFilesize
2.2MB
MD5f6232a2ae8c13154c0b635900e5d5606
SHA13dc773c2edc6dacb581be6ac37e404a091bae760
SHA25657fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c
SHA5128902664b973efd46e56d12f151257bd8988d79ecafa32ee136b171979dac138b7ee98e45b9361f499916013a1fd37572360e6f88cc1fa24d81617328dd6d2ebd
-
C:\ProgramData\gpas\stewbui.exeFilesize
2.2MB
MD5f6232a2ae8c13154c0b635900e5d5606
SHA13dc773c2edc6dacb581be6ac37e404a091bae760
SHA25657fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c
SHA5128902664b973efd46e56d12f151257bd8988d79ecafa32ee136b171979dac138b7ee98e45b9361f499916013a1fd37572360e6f88cc1fa24d81617328dd6d2ebd
-
C:\ProgramData\gpas\stewbui.exeFilesize
2.2MB
MD5f6232a2ae8c13154c0b635900e5d5606
SHA13dc773c2edc6dacb581be6ac37e404a091bae760
SHA25657fe3c34a73768fce9e42473532850c03b47eddcdf878a3afb14318aaacd6b0c
SHA5128902664b973efd46e56d12f151257bd8988d79ecafa32ee136b171979dac138b7ee98e45b9361f499916013a1fd37572360e6f88cc1fa24d81617328dd6d2ebd
-
memory/584-61-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/584-66-0x0000000077920000-0x0000000077AA0000-memory.dmpFilesize
1.5MB
-
memory/584-64-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/584-59-0x0000000000000000-mapping.dmp
-
memory/1348-62-0x0000000077920000-0x0000000077AA0000-memory.dmpFilesize
1.5MB
-
memory/1348-54-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/1348-57-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/1348-65-0x0000000077920000-0x0000000077AA0000-memory.dmpFilesize
1.5MB
-
memory/1348-56-0x0000000077920000-0x0000000077AA0000-memory.dmpFilesize
1.5MB
-
memory/1348-55-0x0000000075881000-0x0000000075883000-memory.dmpFilesize
8KB
-
memory/1564-67-0x0000000000000000-mapping.dmp
-
memory/1564-69-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/1564-71-0x0000000077920000-0x0000000077AA0000-memory.dmpFilesize
1.5MB
-
memory/1564-72-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/1564-73-0x0000000077920000-0x0000000077AA0000-memory.dmpFilesize
1.5MB