Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2023 12:23
Static task
static1
General
-
Target
e688857ff8a34ba9a65f60948744f3fa2e1084b2f080ada0996b7ded50fcab38.exe
-
Size
3.4MB
-
MD5
150b4cbff742a0b51ec685437a7d3459
-
SHA1
f2f555a0417bb04f5a23cdb851304be9c9fdc8c5
-
SHA256
e688857ff8a34ba9a65f60948744f3fa2e1084b2f080ada0996b7ded50fcab38
-
SHA512
fa51820907169072a063fffe9c179631da6324335c9a094bed77dfee96eb8c94df495b6cce5d2b4e96c2bad3b22dc1a53da356c53ed1ab49a73ee5c1f1a59a0f
-
SSDEEP
98304:qna5Gkonx+t5bHJmSwD2jCgQIr/84IVuTPYU:Ua5InxsjmTK+gQIjCwx
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WindowsHolographicDevicesDocuments-type3.9.5.0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WindowsHolographicDevicesDocuments-type3.9.5.0.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WindowsHolographicDevicesDocuments-type3.9.5.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WindowsHolographicDevicesDocuments-type3.9.5.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WindowsHolographicDevicesDocuments-type3.9.5.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WindowsHolographicDevicesDocuments-type3.9.5.0.exe -
Executes dropped EXE 2 IoCs
pid Process 3312 WindowsHolographicDevicesDocuments-type3.9.5.0.exe 4552 WindowsHolographicDevicesDocuments-type3.9.5.0.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 4188 icacls.exe 4064 icacls.exe 3724 icacls.exe -
resource yara_rule behavioral1/files/0x000800000002314d-149.dat upx behavioral1/files/0x000800000002314d-150.dat upx behavioral1/files/0x000800000002314d-151.dat upx behavioral1/memory/3312-153-0x00007FF67FB80000-0x00007FF68009F000-memory.dmp upx behavioral1/memory/3312-154-0x00007FF67FB80000-0x00007FF68009F000-memory.dmp upx behavioral1/memory/3312-155-0x00007FF67FB80000-0x00007FF68009F000-memory.dmp upx behavioral1/files/0x000800000002314d-157.dat upx behavioral1/memory/4552-158-0x00007FF67FB80000-0x00007FF68009F000-memory.dmp upx behavioral1/memory/4552-159-0x00007FF67FB80000-0x00007FF68009F000-memory.dmp upx behavioral1/memory/4552-160-0x00007FF67FB80000-0x00007FF68009F000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsHolographicDevicesDocuments-type3.9.5.0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsHolographicDevicesDocuments-type3.9.5.0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1436 set thread context of 1488 1436 e688857ff8a34ba9a65f60948744f3fa2e1084b2f080ada0996b7ded50fcab38.exe 89 -
Program crash 2 IoCs
pid pid_target Process procid_target 1160 1436 WerFault.exe 85 3028 1436 WerFault.exe 85 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1200 schtasks.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1436 wrote to memory of 1488 1436 e688857ff8a34ba9a65f60948744f3fa2e1084b2f080ada0996b7ded50fcab38.exe 89 PID 1436 wrote to memory of 1488 1436 e688857ff8a34ba9a65f60948744f3fa2e1084b2f080ada0996b7ded50fcab38.exe 89 PID 1436 wrote to memory of 1488 1436 e688857ff8a34ba9a65f60948744f3fa2e1084b2f080ada0996b7ded50fcab38.exe 89 PID 1436 wrote to memory of 1488 1436 e688857ff8a34ba9a65f60948744f3fa2e1084b2f080ada0996b7ded50fcab38.exe 89 PID 1436 wrote to memory of 1488 1436 e688857ff8a34ba9a65f60948744f3fa2e1084b2f080ada0996b7ded50fcab38.exe 89 PID 1436 wrote to memory of 1160 1436 e688857ff8a34ba9a65f60948744f3fa2e1084b2f080ada0996b7ded50fcab38.exe 95 PID 1436 wrote to memory of 1160 1436 e688857ff8a34ba9a65f60948744f3fa2e1084b2f080ada0996b7ded50fcab38.exe 95 PID 1436 wrote to memory of 1160 1436 e688857ff8a34ba9a65f60948744f3fa2e1084b2f080ada0996b7ded50fcab38.exe 95 PID 1488 wrote to memory of 4188 1488 AppLaunch.exe 97 PID 1488 wrote to memory of 4188 1488 AppLaunch.exe 97 PID 1488 wrote to memory of 4188 1488 AppLaunch.exe 97 PID 1488 wrote to memory of 4064 1488 AppLaunch.exe 98 PID 1488 wrote to memory of 4064 1488 AppLaunch.exe 98 PID 1488 wrote to memory of 4064 1488 AppLaunch.exe 98 PID 1488 wrote to memory of 3724 1488 AppLaunch.exe 99 PID 1488 wrote to memory of 3724 1488 AppLaunch.exe 99 PID 1488 wrote to memory of 3724 1488 AppLaunch.exe 99 PID 1488 wrote to memory of 1200 1488 AppLaunch.exe 103 PID 1488 wrote to memory of 1200 1488 AppLaunch.exe 103 PID 1488 wrote to memory of 1200 1488 AppLaunch.exe 103 PID 1488 wrote to memory of 3312 1488 AppLaunch.exe 105 PID 1488 wrote to memory of 3312 1488 AppLaunch.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\e688857ff8a34ba9a65f60948744f3fa2e1084b2f080ada0996b7ded50fcab38.exe"C:\Users\Admin\AppData\Local\Temp\e688857ff8a34ba9a65f60948744f3fa2e1084b2f080ada0996b7ded50fcab38.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\WindowsHolographicDevicesDocuments-type3.9.5.0" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4188
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\WindowsHolographicDevicesDocuments-type3.9.5.0" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4064
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\WindowsHolographicDevicesDocuments-type3.9.5.0" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:3724
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "WindowsHolographicDevicesDocuments-type3.9.5.0\WindowsHolographicDevicesDocuments-type3.9.5.0" /TR "C:\ProgramData\WindowsHolographicDevicesDocuments-type3.9.5.0\WindowsHolographicDevicesDocuments-type3.9.5.0.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:1200
-
-
C:\ProgramData\WindowsHolographicDevicesDocuments-type3.9.5.0\WindowsHolographicDevicesDocuments-type3.9.5.0.exe"C:\ProgramData\WindowsHolographicDevicesDocuments-type3.9.5.0\WindowsHolographicDevicesDocuments-type3.9.5.0.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3312
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 140364962⤵
- Program crash
PID:1160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 140364962⤵
- Program crash
PID:3028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1436 -ip 14361⤵PID:3748
-
C:\ProgramData\WindowsHolographicDevicesDocuments-type3.9.5.0\WindowsHolographicDevicesDocuments-type3.9.5.0.exeC:\ProgramData\WindowsHolographicDevicesDocuments-type3.9.5.0\WindowsHolographicDevicesDocuments-type3.9.5.0.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4552
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\WindowsHolographicDevicesDocuments-type3.9.5.0\WindowsHolographicDevicesDocuments-type3.9.5.0.exe
Filesize482.0MB
MD56f751cf22bac39d101a2de2b633e50d8
SHA10b670142fc811e2845ac05c2a27cf5d6ca5ab7ac
SHA2568be3681717a67d9f0823cd4712a9214f72532722c826948613c5e99dc7490803
SHA5125ac10244d7a1ce9642fb97ac486a787ce18284cda2ba5448b5db2cb68c500d4f3be6ae2d0003b46494e62e421475ec83c5ed5fdcea4e95b1a4fa6aa0ce780af5
-
C:\ProgramData\WindowsHolographicDevicesDocuments-type3.9.5.0\WindowsHolographicDevicesDocuments-type3.9.5.0.exe
Filesize520.6MB
MD515fa36be60d4d765fc28d86e5eaee93d
SHA13830da5f4bf9780963c6a8221ab8a3445c6f11d1
SHA256f7611b827c1c32cd104152e17933b9f2965515b5f191e5f101438ace95f4a267
SHA512de6b858a0ac1d577d2e5a6e371ed8d7a3381a3d05c3a0df6383aaed69baa186d2271607972630b6aec8b9a427c4d789380e6f4d68f838807e82aa6875e0b0448
-
C:\ProgramData\WindowsHolographicDevicesDocuments-type3.9.5.0\WindowsHolographicDevicesDocuments-type3.9.5.0.exe
Filesize467.7MB
MD5b6b19be03b6d6b83349a12eb5579e99f
SHA1e01ddfd15cacac3f8d9881b0c928e8a895fff360
SHA25628772e04ccd21e13bfe029acb9273107f32333ea0ac9603501f4b2a91900815c
SHA5127e905f88f006e78ceaaa30dc81dc028ead8e206e5b4c8d446ab52213db96688c802fb6a3ed90f5e2ffae5e7cbc7ea837a743c2e65d05e61aff80cf2f4e668ddb
-
C:\ProgramData\WindowsHolographicDevicesDocuments-type3.9.5.0\WindowsHolographicDevicesDocuments-type3.9.5.0.exe
Filesize393.4MB
MD5e02b863ee32b51296e52b20163ad2e46
SHA15a6208afca653176b6ad324ea7f9d630d5d1b2a1
SHA256bce5df857cc65150a385f8c48ba8ddeaefa99001eec37868fc9ab16281dc8bb1
SHA512bea95030c1e92254d077a99de079545f5266e1e54ab3f5e908f86c125f2a7856f4e634053f3e129afa140bbbe2b41085d0eb36a3decb83737c8b7a3ea7c3aca6