Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
12-01-2023 15:04
Static task
static1
Behavioral task
behavioral1
Sample
688d65ac7f7320069527a498d55ef4ba.exe
Resource
win7-20221111-en
General
-
Target
688d65ac7f7320069527a498d55ef4ba.exe
-
Size
1.6MB
-
MD5
688d65ac7f7320069527a498d55ef4ba
-
SHA1
e1f2ef3e5f79d96112b127507be0ecf68d053dfe
-
SHA256
bb85e49014f9b6f09e73f32fe5a695549b6b3bf4656cb0041bde68e66f25f54d
-
SHA512
bb77d183f5a7b2d07631f79ecf04d4d7ee76e09057ca282df42090b042bf15afacc172cff28d3835c0d63a012f50e22d5eebd48b3ffa17b5cac3ed67abe16092
-
SSDEEP
24576:g+rjlPyhYziEkqwiX0tDSS1nTa8EjP4OS5lC6faMJLCK8Tmm8qXjUwUk0mW6C:NVPyCzidqwqxO5xL9tmPow9TWb
Malware Config
Extracted
systembc
31.41.244.235:4440
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
688d65ac7f7320069527a498d55ef4ba.exe688d65ac7f7320069527a498d55ef4ba.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 688d65ac7f7320069527a498d55ef4ba.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 688d65ac7f7320069527a498d55ef4ba.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
688d65ac7f7320069527a498d55ef4ba.exe688d65ac7f7320069527a498d55ef4ba.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 688d65ac7f7320069527a498d55ef4ba.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 688d65ac7f7320069527a498d55ef4ba.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 688d65ac7f7320069527a498d55ef4ba.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 688d65ac7f7320069527a498d55ef4ba.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
688d65ac7f7320069527a498d55ef4ba.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Wine 688d65ac7f7320069527a498d55ef4ba.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
688d65ac7f7320069527a498d55ef4ba.exe688d65ac7f7320069527a498d55ef4ba.exepid process 1252 688d65ac7f7320069527a498d55ef4ba.exe 1248 688d65ac7f7320069527a498d55ef4ba.exe -
Drops file in Windows directory 2 IoCs
Processes:
688d65ac7f7320069527a498d55ef4ba.exedescription ioc process File created C:\Windows\Tasks\wow64.job 688d65ac7f7320069527a498d55ef4ba.exe File opened for modification C:\Windows\Tasks\wow64.job 688d65ac7f7320069527a498d55ef4ba.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
688d65ac7f7320069527a498d55ef4ba.exe688d65ac7f7320069527a498d55ef4ba.exepid process 1252 688d65ac7f7320069527a498d55ef4ba.exe 1248 688d65ac7f7320069527a498d55ef4ba.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1780 wrote to memory of 1248 1780 taskeng.exe 688d65ac7f7320069527a498d55ef4ba.exe PID 1780 wrote to memory of 1248 1780 taskeng.exe 688d65ac7f7320069527a498d55ef4ba.exe PID 1780 wrote to memory of 1248 1780 taskeng.exe 688d65ac7f7320069527a498d55ef4ba.exe PID 1780 wrote to memory of 1248 1780 taskeng.exe 688d65ac7f7320069527a498d55ef4ba.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\688d65ac7f7320069527a498d55ef4ba.exe"C:\Users\Admin\AppData\Local\Temp\688d65ac7f7320069527a498d55ef4ba.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1252
-
C:\Windows\system32\taskeng.exetaskeng.exe {2087329C-11F0-41FE-ABF0-FD97CA18507E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\688d65ac7f7320069527a498d55ef4ba.exeC:\Users\Admin\AppData\Local\Temp\688d65ac7f7320069527a498d55ef4ba.exe start2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1248