Analysis

  • max time kernel
    292s
  • max time network
    180s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15-03-2023 05:22

General

  • Target

    fc79578491fc873a67d446cc6f7cc4df92c589516e2c7bc7b2d418823838d97c.exe

  • Size

    3.4MB

  • MD5

    c15dcae56336f681ea1dd5aad33bb62b

  • SHA1

    dec7bdfc4c06c2f1475e9159916da6fd05c7fc36

  • SHA256

    fc79578491fc873a67d446cc6f7cc4df92c589516e2c7bc7b2d418823838d97c

  • SHA512

    4e799450778e10b009e9e81771537b24d05a52cc6799ec869e46327f07b0d68acd478156c4370947aac11e55f69483f422c3f5a00baa878588001fe10c8e2e7b

  • SSDEEP

    49152:onrbOKMFrJmsf6/HAv4fVCnoYcNmCCyQaxfrLkWUhsZz2RNRenjqc4i3PHkVgXIf:YaEU6/HWQ4noYOCtapQX9ejqcT3/SgYf

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Modifies file permissions 1 TTPs 3 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc79578491fc873a67d446cc6f7cc4df92c589516e2c7bc7b2d418823838d97c.exe
    "C:\Users\Admin\AppData\Local\Temp\fc79578491fc873a67d446cc6f7cc4df92c589516e2c7bc7b2d418823838d97c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3480
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3444
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:3880
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:1568
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5" /inheritance:e /deny "admin:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:4392
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /CREATE /TN "SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5" /TR "C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe" /SC MINUTE
        3⤵
        • Creates scheduled task(s)
        PID:3608
      • C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe
        "C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        PID:4748
  • C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe
    C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Checks whether UAC is enabled
    PID:2644

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe

    Filesize

    752.7MB

    MD5

    deaedc65a305e02d259a70b7c7c3a407

    SHA1

    5504d605402e8043ff3364c380b75465b527c5a3

    SHA256

    8ed46f36498fcf9cd95ec947069ed0d813265d49ee12b8720549c19135b72184

    SHA512

    74ff773cf3065b18b3d7cb323996d3024044f19325d49fd5767a7e68352c78ebbfe03eeb5a6c095812b06934ee0f7fc1d26d7e1a5132c15451891d962f5c4957

  • C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe

    Filesize

    752.7MB

    MD5

    deaedc65a305e02d259a70b7c7c3a407

    SHA1

    5504d605402e8043ff3364c380b75465b527c5a3

    SHA256

    8ed46f36498fcf9cd95ec947069ed0d813265d49ee12b8720549c19135b72184

    SHA512

    74ff773cf3065b18b3d7cb323996d3024044f19325d49fd5767a7e68352c78ebbfe03eeb5a6c095812b06934ee0f7fc1d26d7e1a5132c15451891d962f5c4957

  • C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe

    Filesize

    752.7MB

    MD5

    deaedc65a305e02d259a70b7c7c3a407

    SHA1

    5504d605402e8043ff3364c380b75465b527c5a3

    SHA256

    8ed46f36498fcf9cd95ec947069ed0d813265d49ee12b8720549c19135b72184

    SHA512

    74ff773cf3065b18b3d7cb323996d3024044f19325d49fd5767a7e68352c78ebbfe03eeb5a6c095812b06934ee0f7fc1d26d7e1a5132c15451891d962f5c4957

  • memory/2644-157-0x00007FF62FE90000-0x00007FF6303AF000-memory.dmp

    Filesize

    5.1MB

  • memory/2644-156-0x00007FF62FE90000-0x00007FF6303AF000-memory.dmp

    Filesize

    5.1MB

  • memory/2644-155-0x00007FF62FE90000-0x00007FF6303AF000-memory.dmp

    Filesize

    5.1MB

  • memory/3444-128-0x0000000009820000-0x000000000982A000-memory.dmp

    Filesize

    40KB

  • memory/3444-131-0x0000000009AD0000-0x0000000009AE0000-memory.dmp

    Filesize

    64KB

  • memory/3444-130-0x0000000009AD0000-0x0000000009AE0000-memory.dmp

    Filesize

    64KB

  • memory/3444-129-0x0000000009AD0000-0x0000000009AE0000-memory.dmp

    Filesize

    64KB

  • memory/3444-118-0x0000000000400000-0x000000000075C000-memory.dmp

    Filesize

    3.4MB

  • memory/3444-127-0x0000000009AD0000-0x0000000009AE0000-memory.dmp

    Filesize

    64KB

  • memory/3444-126-0x0000000009890000-0x0000000009922000-memory.dmp

    Filesize

    584KB

  • memory/3444-125-0x0000000009D90000-0x000000000A28E000-memory.dmp

    Filesize

    5.0MB

  • memory/4748-148-0x00007FF62FE90000-0x00007FF6303AF000-memory.dmp

    Filesize

    5.1MB

  • memory/4748-149-0x00007FF62FE90000-0x00007FF6303AF000-memory.dmp

    Filesize

    5.1MB

  • memory/4748-152-0x00007FF62FE90000-0x00007FF6303AF000-memory.dmp

    Filesize

    5.1MB

  • memory/4748-153-0x00007FF62FE90000-0x00007FF6303AF000-memory.dmp

    Filesize

    5.1MB