Analysis
-
max time kernel
292s -
max time network
180s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
15-03-2023 05:22
Static task
static1
Behavioral task
behavioral1
Sample
fc79578491fc873a67d446cc6f7cc4df92c589516e2c7bc7b2d418823838d97c.exe
Resource
win7-20230220-en
General
-
Target
fc79578491fc873a67d446cc6f7cc4df92c589516e2c7bc7b2d418823838d97c.exe
-
Size
3.4MB
-
MD5
c15dcae56336f681ea1dd5aad33bb62b
-
SHA1
dec7bdfc4c06c2f1475e9159916da6fd05c7fc36
-
SHA256
fc79578491fc873a67d446cc6f7cc4df92c589516e2c7bc7b2d418823838d97c
-
SHA512
4e799450778e10b009e9e81771537b24d05a52cc6799ec869e46327f07b0d68acd478156c4370947aac11e55f69483f422c3f5a00baa878588001fe10c8e2e7b
-
SSDEEP
49152:onrbOKMFrJmsf6/HAv4fVCnoYcNmCCyQaxfrLkWUhsZz2RNRenjqc4i3PHkVgXIf:YaEU6/HWQ4noYOCtapQX9ejqcT3/SgYf
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe -
Executes dropped EXE 2 IoCs
pid Process 4748 SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe 2644 SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 1568 icacls.exe 4392 icacls.exe 3880 icacls.exe -
resource yara_rule behavioral2/files/0x000900000001aea6-146.dat upx behavioral2/files/0x000900000001aea6-147.dat upx behavioral2/memory/4748-148-0x00007FF62FE90000-0x00007FF6303AF000-memory.dmp upx behavioral2/memory/4748-149-0x00007FF62FE90000-0x00007FF6303AF000-memory.dmp upx behavioral2/memory/4748-152-0x00007FF62FE90000-0x00007FF6303AF000-memory.dmp upx behavioral2/memory/4748-153-0x00007FF62FE90000-0x00007FF6303AF000-memory.dmp upx behavioral2/files/0x000900000001aea6-154.dat upx behavioral2/memory/2644-155-0x00007FF62FE90000-0x00007FF6303AF000-memory.dmp upx behavioral2/memory/2644-156-0x00007FF62FE90000-0x00007FF6303AF000-memory.dmp upx behavioral2/memory/2644-157-0x00007FF62FE90000-0x00007FF6303AF000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3480 set thread context of 3444 3480 fc79578491fc873a67d446cc6f7cc4df92c589516e2c7bc7b2d418823838d97c.exe 67 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3608 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3480 wrote to memory of 3444 3480 fc79578491fc873a67d446cc6f7cc4df92c589516e2c7bc7b2d418823838d97c.exe 67 PID 3480 wrote to memory of 3444 3480 fc79578491fc873a67d446cc6f7cc4df92c589516e2c7bc7b2d418823838d97c.exe 67 PID 3480 wrote to memory of 3444 3480 fc79578491fc873a67d446cc6f7cc4df92c589516e2c7bc7b2d418823838d97c.exe 67 PID 3480 wrote to memory of 3444 3480 fc79578491fc873a67d446cc6f7cc4df92c589516e2c7bc7b2d418823838d97c.exe 67 PID 3480 wrote to memory of 3444 3480 fc79578491fc873a67d446cc6f7cc4df92c589516e2c7bc7b2d418823838d97c.exe 67 PID 3444 wrote to memory of 3880 3444 AppLaunch.exe 68 PID 3444 wrote to memory of 3880 3444 AppLaunch.exe 68 PID 3444 wrote to memory of 3880 3444 AppLaunch.exe 68 PID 3444 wrote to memory of 1568 3444 AppLaunch.exe 69 PID 3444 wrote to memory of 1568 3444 AppLaunch.exe 69 PID 3444 wrote to memory of 1568 3444 AppLaunch.exe 69 PID 3444 wrote to memory of 4392 3444 AppLaunch.exe 71 PID 3444 wrote to memory of 4392 3444 AppLaunch.exe 71 PID 3444 wrote to memory of 4392 3444 AppLaunch.exe 71 PID 3444 wrote to memory of 3608 3444 AppLaunch.exe 74 PID 3444 wrote to memory of 3608 3444 AppLaunch.exe 74 PID 3444 wrote to memory of 3608 3444 AppLaunch.exe 74 PID 3444 wrote to memory of 4748 3444 AppLaunch.exe 76 PID 3444 wrote to memory of 4748 3444 AppLaunch.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc79578491fc873a67d446cc6f7cc4df92c589516e2c7bc7b2d418823838d97c.exe"C:\Users\Admin\AppData\Local\Temp\fc79578491fc873a67d446cc6f7cc4df92c589516e2c7bc7b2d418823838d97c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:3880
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:1568
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4392
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5" /TR "C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:3608
-
-
C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe"C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4748
-
-
-
C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exeC:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe
Filesize752.7MB
MD5deaedc65a305e02d259a70b7c7c3a407
SHA15504d605402e8043ff3364c380b75465b527c5a3
SHA2568ed46f36498fcf9cd95ec947069ed0d813265d49ee12b8720549c19135b72184
SHA51274ff773cf3065b18b3d7cb323996d3024044f19325d49fd5767a7e68352c78ebbfe03eeb5a6c095812b06934ee0f7fc1d26d7e1a5132c15451891d962f5c4957
-
C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe
Filesize752.7MB
MD5deaedc65a305e02d259a70b7c7c3a407
SHA15504d605402e8043ff3364c380b75465b527c5a3
SHA2568ed46f36498fcf9cd95ec947069ed0d813265d49ee12b8720549c19135b72184
SHA51274ff773cf3065b18b3d7cb323996d3024044f19325d49fd5767a7e68352c78ebbfe03eeb5a6c095812b06934ee0f7fc1d26d7e1a5132c15451891d962f5c4957
-
C:\ProgramData\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5\SoftwareDistributionMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type5.8.2.5.exe
Filesize752.7MB
MD5deaedc65a305e02d259a70b7c7c3a407
SHA15504d605402e8043ff3364c380b75465b527c5a3
SHA2568ed46f36498fcf9cd95ec947069ed0d813265d49ee12b8720549c19135b72184
SHA51274ff773cf3065b18b3d7cb323996d3024044f19325d49fd5767a7e68352c78ebbfe03eeb5a6c095812b06934ee0f7fc1d26d7e1a5132c15451891d962f5c4957