Analysis

  • max time kernel
    144s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2023 16:53

General

  • Target

    b65ec990d3d05730c8f9bf204f9e9dc46b4b9e5ebad41420d171ead81d8d6084.exe

  • Size

    3.4MB

  • MD5

    e6686bbea7444250e6cee19f65cb784c

  • SHA1

    ce9e4cc6ea2e003fc4530ae298adbf5a04da196f

  • SHA256

    b65ec990d3d05730c8f9bf204f9e9dc46b4b9e5ebad41420d171ead81d8d6084

  • SHA512

    b2289f2217436d030990c2782fc625861061acf5a27d99a99953b0131ec3cf6106138e287b774595f70b2293fcaf64be0794674812a46cb31d103f92881dacbc

  • SSDEEP

    98304:PQmwMi6hqm+mXHkTiGDsAsQJEwky5CXjcM0Jhv8jYhz:PQmRhfv3DG4+vsXjcM0zv8jS

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Modifies file permissions 1 TTPs 3 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b65ec990d3d05730c8f9bf204f9e9dc46b4b9e5ebad41420d171ead81d8d6084.exe
    "C:\Users\Admin\AppData\Local\Temp\b65ec990d3d05730c8f9bf204f9e9dc46b4b9e5ebad41420d171ead81d8d6084.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3344
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\sshTemplates-type6.7.4.2" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:2708
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\sshTemplates-type6.7.4.2" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:4288
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\sshTemplates-type6.7.4.2" /inheritance:e /deny "admin:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:768
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /CREATE /TN "sshTemplates-type6.7.4.2\sshTemplates-type6.7.4.2" /TR "C:\ProgramData\sshTemplates-type6.7.4.2\sshTemplates-type6.7.4.2.exe" /SC MINUTE
        3⤵
        • Creates scheduled task(s)
        PID:2916
      • C:\ProgramData\sshTemplates-type6.7.4.2\sshTemplates-type6.7.4.2.exe
        "C:\ProgramData\sshTemplates-type6.7.4.2\sshTemplates-type6.7.4.2.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        PID:4876
  • C:\ProgramData\sshTemplates-type6.7.4.2\sshTemplates-type6.7.4.2.exe
    C:\ProgramData\sshTemplates-type6.7.4.2\sshTemplates-type6.7.4.2.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Checks whether UAC is enabled
    PID:2556

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\sshTemplates-type6.7.4.2\sshTemplates-type6.7.4.2.exe

    Filesize

    716.7MB

    MD5

    a7ea35e988c123e05f4f3ab3fc17de9f

    SHA1

    52cd405836670d2daff85aecdd1ac1eec2e16257

    SHA256

    6c79d91d30853682fb7407c9220e31e86902177312d484924b0c231f45fd0233

    SHA512

    78db5b7c161b6b81e38a74bdc124924eb7cb119c0689570bab2347d49a9af194bf10ec07b6e100c926628625cb10fede1b50b90f1946af3ac68f3250153b283d

  • C:\ProgramData\sshTemplates-type6.7.4.2\sshTemplates-type6.7.4.2.exe

    Filesize

    716.7MB

    MD5

    a7ea35e988c123e05f4f3ab3fc17de9f

    SHA1

    52cd405836670d2daff85aecdd1ac1eec2e16257

    SHA256

    6c79d91d30853682fb7407c9220e31e86902177312d484924b0c231f45fd0233

    SHA512

    78db5b7c161b6b81e38a74bdc124924eb7cb119c0689570bab2347d49a9af194bf10ec07b6e100c926628625cb10fede1b50b90f1946af3ac68f3250153b283d

  • C:\ProgramData\sshTemplates-type6.7.4.2\sshTemplates-type6.7.4.2.exe

    Filesize

    387.2MB

    MD5

    52abdf73fc2ea8bd9d9a7d1b0c187abd

    SHA1

    8c0fa9f5e7395ebfa175934a1f4d3ca4943ceefc

    SHA256

    017065e24ccfe8c48930c740a8b39f69e6df42c6704a327cc85652a6575eb5ce

    SHA512

    4b43d6ad40b191e9df176a68b9a6e23529d5451740d0e5cfa399ae34f3a6df64a388a135e3395302d54cb443477e960d627394376cdd8fd6362559c1ce6f030c

  • memory/2556-160-0x00007FF6CDDE0000-0x00007FF6CE2FF000-memory.dmp

    Filesize

    5.1MB

  • memory/2556-159-0x00007FF6CDDE0000-0x00007FF6CE2FF000-memory.dmp

    Filesize

    5.1MB

  • memory/2556-158-0x00007FF6CDDE0000-0x00007FF6CE2FF000-memory.dmp

    Filesize

    5.1MB

  • memory/3344-142-0x00000000057E0000-0x00000000057F0000-memory.dmp

    Filesize

    64KB

  • memory/3344-145-0x00000000057E0000-0x00000000057F0000-memory.dmp

    Filesize

    64KB

  • memory/3344-144-0x00000000057E0000-0x00000000057F0000-memory.dmp

    Filesize

    64KB

  • memory/3344-143-0x00000000057E0000-0x00000000057F0000-memory.dmp

    Filesize

    64KB

  • memory/3344-134-0x0000000000D00000-0x000000000105C000-memory.dmp

    Filesize

    3.4MB

  • memory/3344-141-0x00000000057A0000-0x00000000057AA000-memory.dmp

    Filesize

    40KB

  • memory/3344-140-0x0000000005610000-0x00000000056A2000-memory.dmp

    Filesize

    584KB

  • memory/3344-139-0x0000000005B20000-0x00000000060C4000-memory.dmp

    Filesize

    5.6MB

  • memory/4876-152-0x00007FF6CDDE0000-0x00007FF6CE2FF000-memory.dmp

    Filesize

    5.1MB

  • memory/4876-154-0x00007FF6CDDE0000-0x00007FF6CE2FF000-memory.dmp

    Filesize

    5.1MB

  • memory/4876-155-0x00007FF6CDDE0000-0x00007FF6CE2FF000-memory.dmp

    Filesize

    5.1MB

  • memory/4876-156-0x00007FF6CDDE0000-0x00007FF6CE2FF000-memory.dmp

    Filesize

    5.1MB