Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2023 12:00
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
General
-
Target
tmp.exe
-
Size
3.7MB
-
MD5
92869e94c71833c72b431746f234df5d
-
SHA1
ba100de55cb7b04a6e39e391942b28a31bd3bd00
-
SHA256
67cfdfdb26f8a2ad408fa8e56b8871bbf4657657ef0c263856edaf129378df18
-
SHA512
12add3273ca7e14763f46f90b94c90f7be524d117b657784b6a87f928615a251193de1401be42bdd06c4af3192ce270d8ec766aaf9cbc9e9733e2c371d059f80
-
SSDEEP
98304:1C6bC1J7itJ72IsqMjUB/ynP24vUvO1ReneFnZ2+n+WOYtGQk:xkAKPRgo9cQk
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ tmp.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WindowsPaint-Ver9.1.7.5.exe -
Executes dropped EXE 1 IoCs
pid Process 2944 WindowsPaint-Ver9.1.7.5.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WindowsPaint-Ver9.1.7.5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WindowsPaint-Ver9.1.7.5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tmp.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation tmp.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 1324 icacls.exe 2940 icacls.exe 4312 icacls.exe -
resource yara_rule behavioral2/memory/444-132-0x00000000003C0000-0x0000000000770000-memory.dmp themida behavioral2/memory/444-133-0x00000000003C0000-0x0000000000770000-memory.dmp themida behavioral2/memory/444-134-0x00000000003C0000-0x0000000000770000-memory.dmp themida behavioral2/memory/444-136-0x00000000003C0000-0x0000000000770000-memory.dmp themida behavioral2/files/0x0006000000023151-140.dat themida behavioral2/memory/444-141-0x00000000003C0000-0x0000000000770000-memory.dmp themida behavioral2/files/0x0006000000023151-142.dat themida behavioral2/memory/2944-143-0x0000000000610000-0x00000000009C0000-memory.dmp themida behavioral2/memory/2944-144-0x0000000000610000-0x00000000009C0000-memory.dmp themida behavioral2/memory/2944-145-0x0000000000610000-0x00000000009C0000-memory.dmp themida behavioral2/memory/2944-146-0x0000000000610000-0x00000000009C0000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tmp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsPaint-Ver9.1.7.5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4696 schtasks.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 444 wrote to memory of 4696 444 tmp.exe 80 PID 444 wrote to memory of 4696 444 tmp.exe 80 PID 444 wrote to memory of 4696 444 tmp.exe 80 PID 444 wrote to memory of 1324 444 tmp.exe 88 PID 444 wrote to memory of 1324 444 tmp.exe 88 PID 444 wrote to memory of 1324 444 tmp.exe 88 PID 444 wrote to memory of 2940 444 tmp.exe 90 PID 444 wrote to memory of 2940 444 tmp.exe 90 PID 444 wrote to memory of 2940 444 tmp.exe 90 PID 444 wrote to memory of 4312 444 tmp.exe 92 PID 444 wrote to memory of 4312 444 tmp.exe 92 PID 444 wrote to memory of 4312 444 tmp.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "Windows\IntelComputingTooIklt\IntelPaint9.1.7.5." /TR "C:\ProgramData\MsiBoost\WindowsPaint-Ver9.1.7.5.exe" /SC MINUTE2⤵
- Creates scheduled task(s)
PID:4696
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MsiBoost" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:1324
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MsiBoost" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:2940
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MsiBoost" /inheritance:e /deny "admin:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:4312
-
-
C:\ProgramData\MsiBoost\WindowsPaint-Ver9.1.7.5.exeC:\ProgramData\MsiBoost\WindowsPaint-Ver9.1.7.5.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:2944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1076.1MB
MD5093f981cff75a94b9c44589107c6f63f
SHA13c0492d2686ffd11effcab38f40047bcc187ed09
SHA2565ee6fd2cc214fe52745e72f6569f41b314403a507470e9a6aa5ce6eb3774209c
SHA5120edc7e25d442e305d05707cc47d0e5d87a5784dc48909ced9499156e8d5774e0b881606b1d0f297c73b713b87e5f9432349b45620a965177274e9a52d7d91d87
-
Filesize
1046.7MB
MD5832e7641b24ce7c6f534d426f392cbff
SHA177d5c434ec5e8dd00c7cdee2daf87ddd73fa9bb2
SHA256216448dabf39b7b48e1964977149538b4ba724c9b9ccd5a78bbe8e0abfc55828
SHA512218c1daa401f544f5d5323488e797aacd5df5bf86845264dc351e52a2304822c14e991142b395a0c0d0996ed75ca132ba817550e0a045e7a78ee5a953dc5868e