Analysis

  • max time kernel
    300s
  • max time network
    181s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14/03/2023, 05:10

General

  • Target

    8ec46c0f8ccf629fdab12cee3eb4e7f498ae6a75db1f8b330d91fd2061bc51ee.exe

  • Size

    3.4MB

  • MD5

    53a5446326954751a99eda1c21a06e9a

  • SHA1

    9a6c670c1dc84c34375693d6825c40a479a416f8

  • SHA256

    8ec46c0f8ccf629fdab12cee3eb4e7f498ae6a75db1f8b330d91fd2061bc51ee

  • SHA512

    43c86ee1f4399b553d985070a5b875aac02f286df00b551bc398933adb8aede87f9ddb5f009a2decc8574c4c56dbb96bd79ed427ebe385736251e26661098445

  • SSDEEP

    98304:nmwMi6hqm+mXHkTiGDsAsQJEwky5CXjcM0Jhv8jYhz:nmRhfv3DG4+vsXjcM0zv8jS

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Modifies file permissions 1 TTPs 3 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ec46c0f8ccf629fdab12cee3eb4e7f498ae6a75db1f8b330d91fd2061bc51ee.exe
    "C:\Users\Admin\AppData\Local\Temp\8ec46c0f8ccf629fdab12cee3eb4e7f498ae6a75db1f8b330d91fd2061bc51ee.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2128
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:3808
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:4716
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1" /inheritance:e /deny "admin:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:3164
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /CREATE /TN "MicrosoftSoftwareDistribution-type3.6.7.1\MicrosoftSoftwareDistribution-type3.6.7.1" /TR "C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1\MicrosoftSoftwareDistribution-type3.6.7.1.exe" /SC MINUTE
        3⤵
        • Creates scheduled task(s)
        PID:2496
      • C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1\MicrosoftSoftwareDistribution-type3.6.7.1.exe
        "C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1\MicrosoftSoftwareDistribution-type3.6.7.1.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        PID:3984
  • C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1\MicrosoftSoftwareDistribution-type3.6.7.1.exe
    C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1\MicrosoftSoftwareDistribution-type3.6.7.1.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Checks whether UAC is enabled
    PID:2768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1\MicrosoftSoftwareDistribution-type3.6.7.1.exe

    Filesize

    664.2MB

    MD5

    0c461b2f77ebc24503a7bc7b04c0962e

    SHA1

    bca3be633f84091540b32cf2be45f53128f5b1bf

    SHA256

    179e3b264c7a331400bdef1051297aee4844fed6d45415b7221212da7b7403bc

    SHA512

    3da4c72353ec5de1974c4dbf3fb0d0b3d2aa0108874e96e91133d4e04d2b8591c074b7e221b28324b9cefa7386d2f4ce122c7878015cb86959cd8b31966f971e

  • C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1\MicrosoftSoftwareDistribution-type3.6.7.1.exe

    Filesize

    665.2MB

    MD5

    cd39133933c9676ca6d4971fdb3cf59e

    SHA1

    a2f046437a425d8e219f6b69500ce4f82fea502c

    SHA256

    da10d3ce135d299cee59de66f578d35e85455528b63cabd3457ce86493eaccbf

    SHA512

    5264977dc748e5c575056f96b3c75f187b44abffc58af3378237e4d96db8a2933a44e63f08c689b6c8dedcdb01593aec516fde117e0324709c74fb34345afb3f

  • C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1\MicrosoftSoftwareDistribution-type3.6.7.1.exe

    Filesize

    237.8MB

    MD5

    26b78ed5a678c7da64746147b4a07086

    SHA1

    02f80c7eca420a41a222edc415360815a93f39c9

    SHA256

    3764fd56da8b78608b32e4302da653105f2308a4036bf704bd8919d4a255174d

    SHA512

    b1c4b554080ca2d03b27d6952f4cf2dceae60c3ba8c15017d1f621f5723ac10e422de7cdf3965aac83bbcc70a13490dbf4d1d64c9da4fa4f52b94638224751da

  • memory/2128-127-0x0000000009700000-0x0000000009710000-memory.dmp

    Filesize

    64KB

  • memory/2128-124-0x0000000009940000-0x0000000009E3E000-memory.dmp

    Filesize

    5.0MB

  • memory/2128-128-0x0000000009700000-0x0000000009710000-memory.dmp

    Filesize

    64KB

  • memory/2128-129-0x0000000009700000-0x0000000009710000-memory.dmp

    Filesize

    64KB

  • memory/2128-126-0x0000000009450000-0x000000000945A000-memory.dmp

    Filesize

    40KB

  • memory/2128-125-0x00000000094E0000-0x0000000009572000-memory.dmp

    Filesize

    584KB

  • memory/2128-117-0x0000000000400000-0x000000000075C000-memory.dmp

    Filesize

    3.4MB

  • memory/2768-153-0x00007FF6C7280000-0x00007FF6C779F000-memory.dmp

    Filesize

    5.1MB

  • memory/2768-154-0x00007FF6C7280000-0x00007FF6C779F000-memory.dmp

    Filesize

    5.1MB

  • memory/2768-155-0x00007FF6C7280000-0x00007FF6C779F000-memory.dmp

    Filesize

    5.1MB

  • memory/3984-147-0x00007FF6C7280000-0x00007FF6C779F000-memory.dmp

    Filesize

    5.1MB

  • memory/3984-150-0x00007FF6C7280000-0x00007FF6C779F000-memory.dmp

    Filesize

    5.1MB

  • memory/3984-151-0x00007FF6C7280000-0x00007FF6C779F000-memory.dmp

    Filesize

    5.1MB

  • memory/3984-146-0x00007FF6C7280000-0x00007FF6C779F000-memory.dmp

    Filesize

    5.1MB