Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2023 23:23
Static task
static1
General
-
Target
9a3be46b36f7dc57b878b4cc2e2a293a33f1f35ebc331e7e865de598ab9c5d7e.exe
-
Size
3.4MB
-
MD5
3681f3c785e7073fa692dcf16a1f993c
-
SHA1
bb128e0a650488a940bcb40c164b03b4ceebc74a
-
SHA256
9a3be46b36f7dc57b878b4cc2e2a293a33f1f35ebc331e7e865de598ab9c5d7e
-
SHA512
52ed42c9dc8837c68d4319948065e6ad1a3dce1611aac7d88eb4652cc776101cf06e60ecf8b5e11ce68c79dcb3eba9fdd4fda0f4266f49be058a7ee2ae169900
-
SSDEEP
98304:ana5Gkonx+t5bHJmSwD2jCgQIr/84IVuTPYFw:Ea5InxsjmTK+gQIjCw3
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Oraclessh-type4.6.0.2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Oraclessh-type4.6.0.2.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Oraclessh-type4.6.0.2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Oraclessh-type4.6.0.2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Oraclessh-type4.6.0.2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Oraclessh-type4.6.0.2.exe -
Executes dropped EXE 2 IoCs
pid Process 3148 Oraclessh-type4.6.0.2.exe 3712 Oraclessh-type4.6.0.2.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 4752 icacls.exe 2188 icacls.exe 924 icacls.exe -
resource yara_rule behavioral1/files/0x0006000000023158-147.dat upx behavioral1/files/0x0006000000023158-148.dat upx behavioral1/memory/3148-149-0x00007FF612D70000-0x00007FF61328F000-memory.dmp upx behavioral1/memory/3148-151-0x00007FF612D70000-0x00007FF61328F000-memory.dmp upx behavioral1/memory/3148-152-0x00007FF612D70000-0x00007FF61328F000-memory.dmp upx behavioral1/files/0x0006000000023158-153.dat upx behavioral1/memory/3712-154-0x00007FF612D70000-0x00007FF61328F000-memory.dmp upx behavioral1/memory/3712-155-0x00007FF612D70000-0x00007FF61328F000-memory.dmp upx behavioral1/memory/3712-156-0x00007FF612D70000-0x00007FF61328F000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Oraclessh-type4.6.0.2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Oraclessh-type4.6.0.2.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4000 set thread context of 3804 4000 9a3be46b36f7dc57b878b4cc2e2a293a33f1f35ebc331e7e865de598ab9c5d7e.exe 87 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4764 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4000 wrote to memory of 3804 4000 9a3be46b36f7dc57b878b4cc2e2a293a33f1f35ebc331e7e865de598ab9c5d7e.exe 87 PID 4000 wrote to memory of 3804 4000 9a3be46b36f7dc57b878b4cc2e2a293a33f1f35ebc331e7e865de598ab9c5d7e.exe 87 PID 4000 wrote to memory of 3804 4000 9a3be46b36f7dc57b878b4cc2e2a293a33f1f35ebc331e7e865de598ab9c5d7e.exe 87 PID 4000 wrote to memory of 3804 4000 9a3be46b36f7dc57b878b4cc2e2a293a33f1f35ebc331e7e865de598ab9c5d7e.exe 87 PID 4000 wrote to memory of 3804 4000 9a3be46b36f7dc57b878b4cc2e2a293a33f1f35ebc331e7e865de598ab9c5d7e.exe 87 PID 3804 wrote to memory of 4752 3804 AppLaunch.exe 95 PID 3804 wrote to memory of 4752 3804 AppLaunch.exe 95 PID 3804 wrote to memory of 4752 3804 AppLaunch.exe 95 PID 3804 wrote to memory of 2188 3804 AppLaunch.exe 97 PID 3804 wrote to memory of 2188 3804 AppLaunch.exe 97 PID 3804 wrote to memory of 2188 3804 AppLaunch.exe 97 PID 3804 wrote to memory of 924 3804 AppLaunch.exe 99 PID 3804 wrote to memory of 924 3804 AppLaunch.exe 99 PID 3804 wrote to memory of 924 3804 AppLaunch.exe 99 PID 3804 wrote to memory of 4764 3804 AppLaunch.exe 101 PID 3804 wrote to memory of 4764 3804 AppLaunch.exe 101 PID 3804 wrote to memory of 4764 3804 AppLaunch.exe 101 PID 3804 wrote to memory of 3148 3804 AppLaunch.exe 103 PID 3804 wrote to memory of 3148 3804 AppLaunch.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a3be46b36f7dc57b878b4cc2e2a293a33f1f35ebc331e7e865de598ab9c5d7e.exe"C:\Users\Admin\AppData\Local\Temp\9a3be46b36f7dc57b878b4cc2e2a293a33f1f35ebc331e7e865de598ab9c5d7e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\Oraclessh-type4.6.0.2" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4752
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\Oraclessh-type4.6.0.2" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:2188
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\Oraclessh-type4.6.0.2" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:924
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "Oraclessh-type4.6.0.2\Oraclessh-type4.6.0.2" /TR "C:\ProgramData\Oraclessh-type4.6.0.2\Oraclessh-type4.6.0.2.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:4764
-
-
C:\ProgramData\Oraclessh-type4.6.0.2\Oraclessh-type4.6.0.2.exe"C:\ProgramData\Oraclessh-type4.6.0.2\Oraclessh-type4.6.0.2.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3148
-
-
-
C:\ProgramData\Oraclessh-type4.6.0.2\Oraclessh-type4.6.0.2.exeC:\ProgramData\Oraclessh-type4.6.0.2\Oraclessh-type4.6.0.2.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
788.7MB
MD53c6de774922e880a30b0dff5719557ac
SHA11393d079af8babc6ea75453936459b9808bbaf64
SHA25645b4e26dbba84465aba25763591b90f85266c510ec9e28c6e3015219adc002e0
SHA5123c4949725a0c7ff01e7b7d7d09b7bc5fbfd52a102a9eba58fe8e2d6f356b5d74bcf354837b5d72c9b1f1e9702a5ccd0f3724e5e3a07a2cccce7ba7538fec40dd
-
Filesize
788.7MB
MD53c6de774922e880a30b0dff5719557ac
SHA11393d079af8babc6ea75453936459b9808bbaf64
SHA25645b4e26dbba84465aba25763591b90f85266c510ec9e28c6e3015219adc002e0
SHA5123c4949725a0c7ff01e7b7d7d09b7bc5fbfd52a102a9eba58fe8e2d6f356b5d74bcf354837b5d72c9b1f1e9702a5ccd0f3724e5e3a07a2cccce7ba7538fec40dd
-
Filesize
210.8MB
MD58fb07ca1fcf02f16cfb95fb0fc920dfe
SHA169335a16522d8a93cdf3c5a4046be666f3c749c1
SHA256ce6fa7aef5ce6bab1f41274ebde81656786264358dc92f465399e0e93c7b1908
SHA512526fac639adca9ebd253ffb173eb193d9b2b18db2acb35d908558254589bc7b0f530e820865fbe61ea032075046e52ef9e2caab9529f0c81f200d3a1b149010c