Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2023, 23:04
Static task
static1
General
-
Target
dc3d8f3fb3a8f4367fab01aca21559419c49d3dc63dffa1478371774c0e84c91.exe
-
Size
3.4MB
-
MD5
02c91ef4e73e1abe54e91c4d1612ff0b
-
SHA1
2e120d9061953b7cf802a75602e55f3ba52f9f37
-
SHA256
dc3d8f3fb3a8f4367fab01aca21559419c49d3dc63dffa1478371774c0e84c91
-
SHA512
29e9433d953ad4dc4ea2c77704553125cc24d66102bf5421fdc20bb52326046b047c3ed8bf5fa00333b257cc2ee8de455e74283f0fb1c33b508859ae5b4b0f22
-
SSDEEP
98304:xB32mwMi6hqm+mXHkTiGDsAsQJEwky5CXjcM0Jhv8jYhz:WmRhfv3DG4+vsXjcM0zv8jS
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9.exe -
Executes dropped EXE 2 IoCs
pid Process 5060 WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9.exe 912 WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 1488 icacls.exe 2872 icacls.exe 1784 icacls.exe -
resource yara_rule behavioral1/files/0x000600000002317a-150.dat upx behavioral1/files/0x000600000002317a-149.dat upx behavioral1/memory/5060-153-0x00007FF783050000-0x00007FF78356F000-memory.dmp upx behavioral1/memory/5060-152-0x00007FF783050000-0x00007FF78356F000-memory.dmp upx behavioral1/memory/5060-154-0x00007FF783050000-0x00007FF78356F000-memory.dmp upx behavioral1/memory/5060-155-0x00007FF783050000-0x00007FF78356F000-memory.dmp upx behavioral1/files/0x000600000002317a-156.dat upx behavioral1/memory/912-157-0x00007FF783050000-0x00007FF78356F000-memory.dmp upx behavioral1/memory/912-158-0x00007FF783050000-0x00007FF78356F000-memory.dmp upx behavioral1/memory/912-159-0x00007FF783050000-0x00007FF78356F000-memory.dmp upx behavioral1/memory/912-160-0x00007FF783050000-0x00007FF78356F000-memory.dmp upx behavioral1/memory/912-161-0x00007FF783050000-0x00007FF78356F000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1468 set thread context of 232 1468 dc3d8f3fb3a8f4367fab01aca21559419c49d3dc63dffa1478371774c0e84c91.exe 89 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4676 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1468 wrote to memory of 232 1468 dc3d8f3fb3a8f4367fab01aca21559419c49d3dc63dffa1478371774c0e84c91.exe 89 PID 1468 wrote to memory of 232 1468 dc3d8f3fb3a8f4367fab01aca21559419c49d3dc63dffa1478371774c0e84c91.exe 89 PID 1468 wrote to memory of 232 1468 dc3d8f3fb3a8f4367fab01aca21559419c49d3dc63dffa1478371774c0e84c91.exe 89 PID 1468 wrote to memory of 232 1468 dc3d8f3fb3a8f4367fab01aca21559419c49d3dc63dffa1478371774c0e84c91.exe 89 PID 1468 wrote to memory of 232 1468 dc3d8f3fb3a8f4367fab01aca21559419c49d3dc63dffa1478371774c0e84c91.exe 89 PID 232 wrote to memory of 1488 232 AppLaunch.exe 96 PID 232 wrote to memory of 1488 232 AppLaunch.exe 96 PID 232 wrote to memory of 1488 232 AppLaunch.exe 96 PID 232 wrote to memory of 2872 232 AppLaunch.exe 98 PID 232 wrote to memory of 2872 232 AppLaunch.exe 98 PID 232 wrote to memory of 2872 232 AppLaunch.exe 98 PID 232 wrote to memory of 1784 232 AppLaunch.exe 100 PID 232 wrote to memory of 1784 232 AppLaunch.exe 100 PID 232 wrote to memory of 1784 232 AppLaunch.exe 100 PID 232 wrote to memory of 4676 232 AppLaunch.exe 102 PID 232 wrote to memory of 4676 232 AppLaunch.exe 102 PID 232 wrote to memory of 4676 232 AppLaunch.exe 102 PID 232 wrote to memory of 5060 232 AppLaunch.exe 104 PID 232 wrote to memory of 5060 232 AppLaunch.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc3d8f3fb3a8f4367fab01aca21559419c49d3dc63dffa1478371774c0e84c91.exe"C:\Users\Admin\AppData\Local\Temp\dc3d8f3fb3a8f4367fab01aca21559419c49d3dc63dffa1478371774c0e84c91.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:1488
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:2872
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:1784
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9\WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9" /TR "C:\ProgramData\WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9\WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:4676
-
-
C:\ProgramData\WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9\WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9.exe"C:\ProgramData\WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9\WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:5060
-
-
-
C:\ProgramData\WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9\WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9.exeC:\ProgramData\WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9\WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:912
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9\WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9.exe
Filesize774.8MB
MD5e034b2e464fe3a58ebd7dc846de45a4a
SHA1bf7b3858e716542750e41a28ce72a42c61190d3f
SHA2563003556b344a44cd7a2a8d027a0f7f7041a9f8342e317924c42f8696168e7fe8
SHA512554a475b83a7956373fb9e664cee427fd8d437866d7d6b502fc29050b23b6b345cceb99af577a212e3c2bc0a4b8e3ad0e8b7649eb5c672d0642289e0479828a4
-
C:\ProgramData\WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9\WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9.exe
Filesize774.8MB
MD5e034b2e464fe3a58ebd7dc846de45a4a
SHA1bf7b3858e716542750e41a28ce72a42c61190d3f
SHA2563003556b344a44cd7a2a8d027a0f7f7041a9f8342e317924c42f8696168e7fe8
SHA512554a475b83a7956373fb9e664cee427fd8d437866d7d6b502fc29050b23b6b345cceb99af577a212e3c2bc0a4b8e3ad0e8b7649eb5c672d0642289e0479828a4
-
C:\ProgramData\WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9\WindowsHolographicDevicesSoftwareDistribution-type9.6.8.9.exe
Filesize394.4MB
MD5a1d817ed14e8f0a71da8cdca05d1c579
SHA11fe51cb8adf555107c752c66c2e58e5e7802799e
SHA2560a155849a8c2d62e6650d472e03187f24834bf49d501da8393b5fc3abdf29e61
SHA5127085e48f706a33dc57877b9e593b18bc7d584faa5fa940acbfbc56f3c6eb14200ca3969bcce80542dbcbaaf42d28e5752a8917360f19135ed09ce39618de93b8