Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2023 02:58
Static task
static1
General
-
Target
40e88b99a6b03c16111987fa7aaf98cbb564055f2d822aa213b497ec70232c18.exe
-
Size
3.4MB
-
MD5
a4156d3baec30f5866d6a2403b9341d5
-
SHA1
62820b126f3c67487904729897e17ef7bd4e3417
-
SHA256
40e88b99a6b03c16111987fa7aaf98cbb564055f2d822aa213b497ec70232c18
-
SHA512
3a4e5cac114ed6d9a9fa10ccc1165322e7bfebae19794da69f65f1b9479ef7d74e4bffb2ad1e1aa173a7fc8a04b97a2f1cf465f73d6e3593dcf3c3d9c2cd3ac8
-
SSDEEP
98304:lmwMi6hqm+mXHkTiGDsAsQJEwky5CXjcM0Jhv8jYhz:lmRhfv3DG4+vsXjcM0zv8jS
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0.exe -
Executes dropped EXE 2 IoCs
pid Process 1892 Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0.exe 3436 Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 1752 icacls.exe 4396 icacls.exe 4748 icacls.exe -
resource yara_rule behavioral1/files/0x0005000000022513-150.dat upx behavioral1/files/0x0005000000022513-151.dat upx behavioral1/files/0x0005000000022513-152.dat upx behavioral1/memory/1892-154-0x00007FF62D4F0000-0x00007FF62DA0F000-memory.dmp upx behavioral1/memory/1892-155-0x00007FF62D4F0000-0x00007FF62DA0F000-memory.dmp upx behavioral1/memory/1892-156-0x00007FF62D4F0000-0x00007FF62DA0F000-memory.dmp upx behavioral1/memory/1892-157-0x00007FF62D4F0000-0x00007FF62DA0F000-memory.dmp upx behavioral1/files/0x0005000000022513-158.dat upx behavioral1/memory/3436-159-0x00007FF62D4F0000-0x00007FF62DA0F000-memory.dmp upx behavioral1/memory/3436-160-0x00007FF62D4F0000-0x00007FF62DA0F000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3524 set thread context of 60 3524 40e88b99a6b03c16111987fa7aaf98cbb564055f2d822aa213b497ec70232c18.exe 87 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2552 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3524 wrote to memory of 60 3524 40e88b99a6b03c16111987fa7aaf98cbb564055f2d822aa213b497ec70232c18.exe 87 PID 3524 wrote to memory of 60 3524 40e88b99a6b03c16111987fa7aaf98cbb564055f2d822aa213b497ec70232c18.exe 87 PID 3524 wrote to memory of 60 3524 40e88b99a6b03c16111987fa7aaf98cbb564055f2d822aa213b497ec70232c18.exe 87 PID 3524 wrote to memory of 60 3524 40e88b99a6b03c16111987fa7aaf98cbb564055f2d822aa213b497ec70232c18.exe 87 PID 3524 wrote to memory of 60 3524 40e88b99a6b03c16111987fa7aaf98cbb564055f2d822aa213b497ec70232c18.exe 87 PID 60 wrote to memory of 1752 60 AppLaunch.exe 94 PID 60 wrote to memory of 1752 60 AppLaunch.exe 94 PID 60 wrote to memory of 1752 60 AppLaunch.exe 94 PID 60 wrote to memory of 4396 60 AppLaunch.exe 96 PID 60 wrote to memory of 4396 60 AppLaunch.exe 96 PID 60 wrote to memory of 4396 60 AppLaunch.exe 96 PID 60 wrote to memory of 4748 60 AppLaunch.exe 97 PID 60 wrote to memory of 4748 60 AppLaunch.exe 97 PID 60 wrote to memory of 4748 60 AppLaunch.exe 97 PID 60 wrote to memory of 2552 60 AppLaunch.exe 100 PID 60 wrote to memory of 2552 60 AppLaunch.exe 100 PID 60 wrote to memory of 2552 60 AppLaunch.exe 100 PID 60 wrote to memory of 1892 60 AppLaunch.exe 102 PID 60 wrote to memory of 1892 60 AppLaunch.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\40e88b99a6b03c16111987fa7aaf98cbb564055f2d822aa213b497ec70232c18.exe"C:\Users\Admin\AppData\Local\Temp\40e88b99a6b03c16111987fa7aaf98cbb564055f2d822aa213b497ec70232c18.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:1752
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4396
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4748
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0" /TR "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:2552
-
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0.exe"C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1892
-
-
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0.exeC:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3436
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0.exe
Filesize677.8MB
MD59bb9bc01b5b7adcdc53232e48ad388c6
SHA17586666c7136940365ac235c5d34d4c0b1a31e03
SHA256d63dbcf2d631f58391a790249a86e04fee30f3d94eb8a373df0c4d6cf88e2010
SHA51211fa6bfc048a2012d754ba0b570547d40773bbd04356649d55ee38b2b3b5dcb7e96980a81bfed286680de06013bcb1d3b8586cd17ade6e8913b70853c2d25374
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0.exe
Filesize674.9MB
MD53d19075bbcbe687b76f1c16fb8435d58
SHA1477a788dda699e879ffc2fe4627330bfeff11eb8
SHA256d38a07d92422a1039dfcf9b625c13ee43f399145aca2540d162c2cd1955e66a6
SHA51258aff754ef6039e47db5f37302653005e678f4252b9922700176f62e9794434ccb360de34c123af977c9f1d310da8f55ae2bace13f19c901f93c5a7ac5fab33c
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0.exe
Filesize661.8MB
MD5a7eb1f751e475c4b1d6b1327ebdd259c
SHA1e109d65fc7f9e4bb098fd7c6706170196758a585
SHA256d709363a1b222afa64011c5f551cd013e8bf1a270b1baa7c6e52e879c798a221
SHA5128053bc2704762cae154e0859e09dd9f516120def9a218a77b1aa38beba9a83a1c0b75ee6056b0fb657967bf6e5a48fa0355624c03480ee952d17424dc7e7f434
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type1.0.8.0.exe
Filesize19.2MB
MD5636d37abe357e406b8a999b50edca68d
SHA147f58146eabfab0cffd2d76c3ac373d2c86954c1
SHA25690784f71e827597be5f63cccdc0a63db0a728aef6c1dc542a9620489087ee2ab
SHA5126faa3d940303d7344af9ca933939ad1ded581f208d28fd90f46274495fa5125082d92be67dfa822b0fd12d3a4482f825927135af0247a3c469733c243865cb6e