Analysis
-
max time kernel
300s -
max time network
181s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14/03/2023, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
8ec46c0f8ccf629fdab12cee3eb4e7f498ae6a75db1f8b330d91fd2061bc51ee.exe
Resource
win7-20230220-en
General
-
Target
8ec46c0f8ccf629fdab12cee3eb4e7f498ae6a75db1f8b330d91fd2061bc51ee.exe
-
Size
3.4MB
-
MD5
53a5446326954751a99eda1c21a06e9a
-
SHA1
9a6c670c1dc84c34375693d6825c40a479a416f8
-
SHA256
8ec46c0f8ccf629fdab12cee3eb4e7f498ae6a75db1f8b330d91fd2061bc51ee
-
SHA512
43c86ee1f4399b553d985070a5b875aac02f286df00b551bc398933adb8aede87f9ddb5f009a2decc8574c4c56dbb96bd79ed427ebe385736251e26661098445
-
SSDEEP
98304:nmwMi6hqm+mXHkTiGDsAsQJEwky5CXjcM0Jhv8jYhz:nmRhfv3DG4+vsXjcM0zv8jS
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MicrosoftSoftwareDistribution-type3.6.7.1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MicrosoftSoftwareDistribution-type3.6.7.1.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MicrosoftSoftwareDistribution-type3.6.7.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MicrosoftSoftwareDistribution-type3.6.7.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MicrosoftSoftwareDistribution-type3.6.7.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MicrosoftSoftwareDistribution-type3.6.7.1.exe -
Executes dropped EXE 2 IoCs
pid Process 3984 MicrosoftSoftwareDistribution-type3.6.7.1.exe 2768 MicrosoftSoftwareDistribution-type3.6.7.1.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 3164 icacls.exe 3808 icacls.exe 4716 icacls.exe -
resource yara_rule behavioral2/files/0x000900000001ae8a-144.dat upx behavioral2/files/0x000900000001ae8a-145.dat upx behavioral2/memory/3984-146-0x00007FF6C7280000-0x00007FF6C779F000-memory.dmp upx behavioral2/memory/3984-147-0x00007FF6C7280000-0x00007FF6C779F000-memory.dmp upx behavioral2/memory/3984-150-0x00007FF6C7280000-0x00007FF6C779F000-memory.dmp upx behavioral2/memory/3984-151-0x00007FF6C7280000-0x00007FF6C779F000-memory.dmp upx behavioral2/files/0x000900000001ae8a-152.dat upx behavioral2/memory/2768-153-0x00007FF6C7280000-0x00007FF6C779F000-memory.dmp upx behavioral2/memory/2768-154-0x00007FF6C7280000-0x00007FF6C779F000-memory.dmp upx behavioral2/memory/2768-155-0x00007FF6C7280000-0x00007FF6C779F000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MicrosoftSoftwareDistribution-type3.6.7.1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MicrosoftSoftwareDistribution-type3.6.7.1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4616 set thread context of 2128 4616 8ec46c0f8ccf629fdab12cee3eb4e7f498ae6a75db1f8b330d91fd2061bc51ee.exe 67 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2496 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4616 wrote to memory of 2128 4616 8ec46c0f8ccf629fdab12cee3eb4e7f498ae6a75db1f8b330d91fd2061bc51ee.exe 67 PID 4616 wrote to memory of 2128 4616 8ec46c0f8ccf629fdab12cee3eb4e7f498ae6a75db1f8b330d91fd2061bc51ee.exe 67 PID 4616 wrote to memory of 2128 4616 8ec46c0f8ccf629fdab12cee3eb4e7f498ae6a75db1f8b330d91fd2061bc51ee.exe 67 PID 4616 wrote to memory of 2128 4616 8ec46c0f8ccf629fdab12cee3eb4e7f498ae6a75db1f8b330d91fd2061bc51ee.exe 67 PID 4616 wrote to memory of 2128 4616 8ec46c0f8ccf629fdab12cee3eb4e7f498ae6a75db1f8b330d91fd2061bc51ee.exe 67 PID 2128 wrote to memory of 3808 2128 AppLaunch.exe 68 PID 2128 wrote to memory of 3808 2128 AppLaunch.exe 68 PID 2128 wrote to memory of 3808 2128 AppLaunch.exe 68 PID 2128 wrote to memory of 4716 2128 AppLaunch.exe 70 PID 2128 wrote to memory of 4716 2128 AppLaunch.exe 70 PID 2128 wrote to memory of 4716 2128 AppLaunch.exe 70 PID 2128 wrote to memory of 3164 2128 AppLaunch.exe 71 PID 2128 wrote to memory of 3164 2128 AppLaunch.exe 71 PID 2128 wrote to memory of 3164 2128 AppLaunch.exe 71 PID 2128 wrote to memory of 2496 2128 AppLaunch.exe 74 PID 2128 wrote to memory of 2496 2128 AppLaunch.exe 74 PID 2128 wrote to memory of 2496 2128 AppLaunch.exe 74 PID 2128 wrote to memory of 3984 2128 AppLaunch.exe 76 PID 2128 wrote to memory of 3984 2128 AppLaunch.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ec46c0f8ccf629fdab12cee3eb4e7f498ae6a75db1f8b330d91fd2061bc51ee.exe"C:\Users\Admin\AppData\Local\Temp\8ec46c0f8ccf629fdab12cee3eb4e7f498ae6a75db1f8b330d91fd2061bc51ee.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:3808
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4716
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:3164
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "MicrosoftSoftwareDistribution-type3.6.7.1\MicrosoftSoftwareDistribution-type3.6.7.1" /TR "C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1\MicrosoftSoftwareDistribution-type3.6.7.1.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:2496
-
-
C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1\MicrosoftSoftwareDistribution-type3.6.7.1.exe"C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1\MicrosoftSoftwareDistribution-type3.6.7.1.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3984
-
-
-
C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1\MicrosoftSoftwareDistribution-type3.6.7.1.exeC:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1\MicrosoftSoftwareDistribution-type3.6.7.1.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1\MicrosoftSoftwareDistribution-type3.6.7.1.exe
Filesize664.2MB
MD50c461b2f77ebc24503a7bc7b04c0962e
SHA1bca3be633f84091540b32cf2be45f53128f5b1bf
SHA256179e3b264c7a331400bdef1051297aee4844fed6d45415b7221212da7b7403bc
SHA5123da4c72353ec5de1974c4dbf3fb0d0b3d2aa0108874e96e91133d4e04d2b8591c074b7e221b28324b9cefa7386d2f4ce122c7878015cb86959cd8b31966f971e
-
C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1\MicrosoftSoftwareDistribution-type3.6.7.1.exe
Filesize665.2MB
MD5cd39133933c9676ca6d4971fdb3cf59e
SHA1a2f046437a425d8e219f6b69500ce4f82fea502c
SHA256da10d3ce135d299cee59de66f578d35e85455528b63cabd3457ce86493eaccbf
SHA5125264977dc748e5c575056f96b3c75f187b44abffc58af3378237e4d96db8a2933a44e63f08c689b6c8dedcdb01593aec516fde117e0324709c74fb34345afb3f
-
C:\ProgramData\MicrosoftSoftwareDistribution-type3.6.7.1\MicrosoftSoftwareDistribution-type3.6.7.1.exe
Filesize237.8MB
MD526b78ed5a678c7da64746147b4a07086
SHA102f80c7eca420a41a222edc415360815a93f39c9
SHA2563764fd56da8b78608b32e4302da653105f2308a4036bf704bd8919d4a255174d
SHA512b1c4b554080ca2d03b27d6952f4cf2dceae60c3ba8c15017d1f621f5723ac10e422de7cdf3965aac83bbcc70a13490dbf4d1d64c9da4fa4f52b94638224751da