Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13-03-2023 09:20

General

  • Target

    767e24bd2ddbc19f639745c9f6152159465352a59c9393e6ef61bfcb0ab98e0a.exe

  • Size

    3.4MB

  • MD5

    1f11f17ea4f84c1668f4592e48100942

  • SHA1

    9b7f0163fb51769431a5ba70f6b39c2954d7c17d

  • SHA256

    767e24bd2ddbc19f639745c9f6152159465352a59c9393e6ef61bfcb0ab98e0a

  • SHA512

    b4a8c2f5e0f5fd7d9dfbfaedea9e2fb9abf14191a1d3baefe3a31ad060268410685428861c3a276cf3879ef30071298a3610d9a215671b65544ddccdbde30fdd

  • SSDEEP

    98304:JWAaEU6/HWQ4noYOCtapQX9ejqcT3/SgYC:wBEH/QotQGrT3T

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Modifies file permissions 1 TTPs 3 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\767e24bd2ddbc19f639745c9f6152159465352a59c9393e6ef61bfcb0ab98e0a.exe
    "C:\Users\Admin\AppData\Local\Temp\767e24bd2ddbc19f639745c9f6152159465352a59c9393e6ef61bfcb0ab98e0a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:400
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2408
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\DesktopMicrosoft-type4.9.5.2" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:3116
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\DesktopMicrosoft-type4.9.5.2" /inheritance:e /deny "admin:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:4204
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\DesktopMicrosoft-type4.9.5.2" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:3096
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /CREATE /TN "DesktopMicrosoft-type4.9.5.2\DesktopMicrosoft-type4.9.5.2" /TR "C:\ProgramData\DesktopMicrosoft-type4.9.5.2\DesktopMicrosoft-type4.9.5.2.exe" /SC MINUTE
        3⤵
        • Creates scheduled task(s)
        PID:3568
      • C:\ProgramData\DesktopMicrosoft-type4.9.5.2\DesktopMicrosoft-type4.9.5.2.exe
        "C:\ProgramData\DesktopMicrosoft-type4.9.5.2\DesktopMicrosoft-type4.9.5.2.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        PID:2168
  • C:\ProgramData\DesktopMicrosoft-type4.9.5.2\DesktopMicrosoft-type4.9.5.2.exe
    C:\ProgramData\DesktopMicrosoft-type4.9.5.2\DesktopMicrosoft-type4.9.5.2.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Checks whether UAC is enabled
    PID:2928

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\DesktopMicrosoft-type4.9.5.2\DesktopMicrosoft-type4.9.5.2.exe

    Filesize

    586.6MB

    MD5

    1eea44de72741045bb28ee09a457b4da

    SHA1

    7d0d4b050dda913565eefc9f562f26fc537c44f1

    SHA256

    655adaf4f8136558225c79f6be4228dbdf5a6b8681c9689e2e2957424dbc610d

    SHA512

    47ecae4a654e531fc119c10d81aa36cf1c433b9d146594db67856bfdad3a6207fe1faa68b6ec9f0e21357e0976ac11cde5c0201d17a4f1b2ee822fcd92ebce8d

  • C:\ProgramData\DesktopMicrosoft-type4.9.5.2\DesktopMicrosoft-type4.9.5.2.exe

    Filesize

    629.0MB

    MD5

    c6a92118d8de9c06099bd7226d1073f8

    SHA1

    29bf8879e784561a968f98d3128bc1029fdb6c9d

    SHA256

    f59197133f1cb106e05f8b91823460dc4cc8d955b95691f871f6cf9101eec528

    SHA512

    7cfec682f024a7e41489112663bb6a5fa01e5f460a6176b9e6a9b43c89d20423ac7fd8bcc6f350b7774da212b77d5e0bae39f168735984197e16985521006856

  • C:\ProgramData\DesktopMicrosoft-type4.9.5.2\DesktopMicrosoft-type4.9.5.2.exe

    Filesize

    472.8MB

    MD5

    abd93655b476ca2b2cb2f6cffeeb5ed3

    SHA1

    21ef29e4f4b6824277adfaaa4a79384449a586d2

    SHA256

    e9d2a4375883183da6b21fe9cd3783a9056a7421f3674b7d608ddd608c663c46

    SHA512

    89901fd9cd06ad1e873ebfb209da1d1172beeff200c435065144d1a26ebf5a8c9dac49226f99d2dd11076b37647f56e1ee670a9416274df480ce324d83748319

  • memory/2168-155-0x00007FF67A5A0000-0x00007FF67AABF000-memory.dmp

    Filesize

    5.1MB

  • memory/2168-153-0x00007FF67A5A0000-0x00007FF67AABF000-memory.dmp

    Filesize

    5.1MB

  • memory/2168-154-0x00007FF67A5A0000-0x00007FF67AABF000-memory.dmp

    Filesize

    5.1MB

  • memory/2408-135-0x00000000094F0000-0x0000000009500000-memory.dmp

    Filesize

    64KB

  • memory/2408-132-0x00000000093C0000-0x00000000093CA000-memory.dmp

    Filesize

    40KB

  • memory/2408-131-0x00000000094F0000-0x0000000009500000-memory.dmp

    Filesize

    64KB

  • memory/2408-130-0x00000000092E0000-0x0000000009372000-memory.dmp

    Filesize

    584KB

  • memory/2408-134-0x00000000094F0000-0x0000000009500000-memory.dmp

    Filesize

    64KB

  • memory/2408-133-0x00000000094F0000-0x0000000009500000-memory.dmp

    Filesize

    64KB

  • memory/2408-122-0x0000000000400000-0x000000000075C000-memory.dmp

    Filesize

    3.4MB

  • memory/2408-129-0x00000000097E0000-0x0000000009CDE000-memory.dmp

    Filesize

    5.0MB

  • memory/2928-158-0x00007FF67A5A0000-0x00007FF67AABF000-memory.dmp

    Filesize

    5.1MB

  • memory/2928-159-0x00007FF67A5A0000-0x00007FF67AABF000-memory.dmp

    Filesize

    5.1MB

  • memory/2928-160-0x00007FF67A5A0000-0x00007FF67AABF000-memory.dmp

    Filesize

    5.1MB