Analysis
-
max time kernel
144s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2023 16:53
Static task
static1
General
-
Target
b65ec990d3d05730c8f9bf204f9e9dc46b4b9e5ebad41420d171ead81d8d6084.exe
-
Size
3.4MB
-
MD5
e6686bbea7444250e6cee19f65cb784c
-
SHA1
ce9e4cc6ea2e003fc4530ae298adbf5a04da196f
-
SHA256
b65ec990d3d05730c8f9bf204f9e9dc46b4b9e5ebad41420d171ead81d8d6084
-
SHA512
b2289f2217436d030990c2782fc625861061acf5a27d99a99953b0131ec3cf6106138e287b774595f70b2293fcaf64be0794674812a46cb31d103f92881dacbc
-
SSDEEP
98304:PQmwMi6hqm+mXHkTiGDsAsQJEwky5CXjcM0Jhv8jYhz:PQmRhfv3DG4+vsXjcM0zv8jS
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sshTemplates-type6.7.4.2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sshTemplates-type6.7.4.2.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sshTemplates-type6.7.4.2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sshTemplates-type6.7.4.2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sshTemplates-type6.7.4.2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sshTemplates-type6.7.4.2.exe -
Executes dropped EXE 2 IoCs
pid Process 4876 sshTemplates-type6.7.4.2.exe 2556 sshTemplates-type6.7.4.2.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 2708 icacls.exe 4288 icacls.exe 768 icacls.exe -
resource yara_rule behavioral1/files/0x0006000000023128-150.dat upx behavioral1/files/0x0006000000023128-151.dat upx behavioral1/memory/4876-152-0x00007FF6CDDE0000-0x00007FF6CE2FF000-memory.dmp upx behavioral1/memory/4876-154-0x00007FF6CDDE0000-0x00007FF6CE2FF000-memory.dmp upx behavioral1/memory/4876-155-0x00007FF6CDDE0000-0x00007FF6CE2FF000-memory.dmp upx behavioral1/memory/4876-156-0x00007FF6CDDE0000-0x00007FF6CE2FF000-memory.dmp upx behavioral1/files/0x0006000000023128-157.dat upx behavioral1/memory/2556-158-0x00007FF6CDDE0000-0x00007FF6CE2FF000-memory.dmp upx behavioral1/memory/2556-159-0x00007FF6CDDE0000-0x00007FF6CE2FF000-memory.dmp upx behavioral1/memory/2556-160-0x00007FF6CDDE0000-0x00007FF6CE2FF000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sshTemplates-type6.7.4.2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sshTemplates-type6.7.4.2.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2040 set thread context of 3344 2040 b65ec990d3d05730c8f9bf204f9e9dc46b4b9e5ebad41420d171ead81d8d6084.exe 89 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2916 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2040 wrote to memory of 3344 2040 b65ec990d3d05730c8f9bf204f9e9dc46b4b9e5ebad41420d171ead81d8d6084.exe 89 PID 2040 wrote to memory of 3344 2040 b65ec990d3d05730c8f9bf204f9e9dc46b4b9e5ebad41420d171ead81d8d6084.exe 89 PID 2040 wrote to memory of 3344 2040 b65ec990d3d05730c8f9bf204f9e9dc46b4b9e5ebad41420d171ead81d8d6084.exe 89 PID 2040 wrote to memory of 3344 2040 b65ec990d3d05730c8f9bf204f9e9dc46b4b9e5ebad41420d171ead81d8d6084.exe 89 PID 2040 wrote to memory of 3344 2040 b65ec990d3d05730c8f9bf204f9e9dc46b4b9e5ebad41420d171ead81d8d6084.exe 89 PID 3344 wrote to memory of 2708 3344 AppLaunch.exe 96 PID 3344 wrote to memory of 2708 3344 AppLaunch.exe 96 PID 3344 wrote to memory of 2708 3344 AppLaunch.exe 96 PID 3344 wrote to memory of 4288 3344 AppLaunch.exe 98 PID 3344 wrote to memory of 4288 3344 AppLaunch.exe 98 PID 3344 wrote to memory of 4288 3344 AppLaunch.exe 98 PID 3344 wrote to memory of 768 3344 AppLaunch.exe 100 PID 3344 wrote to memory of 768 3344 AppLaunch.exe 100 PID 3344 wrote to memory of 768 3344 AppLaunch.exe 100 PID 3344 wrote to memory of 2916 3344 AppLaunch.exe 102 PID 3344 wrote to memory of 2916 3344 AppLaunch.exe 102 PID 3344 wrote to memory of 2916 3344 AppLaunch.exe 102 PID 3344 wrote to memory of 4876 3344 AppLaunch.exe 104 PID 3344 wrote to memory of 4876 3344 AppLaunch.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\b65ec990d3d05730c8f9bf204f9e9dc46b4b9e5ebad41420d171ead81d8d6084.exe"C:\Users\Admin\AppData\Local\Temp\b65ec990d3d05730c8f9bf204f9e9dc46b4b9e5ebad41420d171ead81d8d6084.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\sshTemplates-type6.7.4.2" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:2708
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\sshTemplates-type6.7.4.2" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4288
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\sshTemplates-type6.7.4.2" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:768
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "sshTemplates-type6.7.4.2\sshTemplates-type6.7.4.2" /TR "C:\ProgramData\sshTemplates-type6.7.4.2\sshTemplates-type6.7.4.2.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:2916
-
-
C:\ProgramData\sshTemplates-type6.7.4.2\sshTemplates-type6.7.4.2.exe"C:\ProgramData\sshTemplates-type6.7.4.2\sshTemplates-type6.7.4.2.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4876
-
-
-
C:\ProgramData\sshTemplates-type6.7.4.2\sshTemplates-type6.7.4.2.exeC:\ProgramData\sshTemplates-type6.7.4.2\sshTemplates-type6.7.4.2.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2556
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
716.7MB
MD5a7ea35e988c123e05f4f3ab3fc17de9f
SHA152cd405836670d2daff85aecdd1ac1eec2e16257
SHA2566c79d91d30853682fb7407c9220e31e86902177312d484924b0c231f45fd0233
SHA51278db5b7c161b6b81e38a74bdc124924eb7cb119c0689570bab2347d49a9af194bf10ec07b6e100c926628625cb10fede1b50b90f1946af3ac68f3250153b283d
-
Filesize
716.7MB
MD5a7ea35e988c123e05f4f3ab3fc17de9f
SHA152cd405836670d2daff85aecdd1ac1eec2e16257
SHA2566c79d91d30853682fb7407c9220e31e86902177312d484924b0c231f45fd0233
SHA51278db5b7c161b6b81e38a74bdc124924eb7cb119c0689570bab2347d49a9af194bf10ec07b6e100c926628625cb10fede1b50b90f1946af3ac68f3250153b283d
-
Filesize
387.2MB
MD552abdf73fc2ea8bd9d9a7d1b0c187abd
SHA18c0fa9f5e7395ebfa175934a1f4d3ca4943ceefc
SHA256017065e24ccfe8c48930c740a8b39f69e6df42c6704a327cc85652a6575eb5ce
SHA5124b43d6ad40b191e9df176a68b9a6e23529d5451740d0e5cfa399ae34f3a6df64a388a135e3395302d54cb443477e960d627394376cdd8fd6362559c1ce6f030c