Analysis
-
max time kernel
141s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18/03/2023, 07:55
Static task
static1
Behavioral task
behavioral1
Sample
964210bbe9ccdd4289aafb49fe2eba8f.exe
Resource
win7-20230220-en
General
-
Target
964210bbe9ccdd4289aafb49fe2eba8f.exe
-
Size
6.9MB
-
MD5
964210bbe9ccdd4289aafb49fe2eba8f
-
SHA1
07f0d6cbcbb41009f81e325c33ab8b94e0c35d6d
-
SHA256
68dbf9ee186dd2a81142d255b9d384b9a5886a576bec570bdfa76e9ee9a7a39e
-
SHA512
515274fef4f183b7cf67b74de479623449ad707d102c811414bd797a51f38b990f698aa1c5895b26fa0c71608a5a3e93604bf05b9da30ec5a26d88a9316ffa9e
-
SSDEEP
98304:gt3yRBVbDaNePUgYwn2hkAABPRVbu8Bn1jmd2XFpurnlWkPUvCOuZGj/JflYVY+:6yBbLPUgYlaHnBnBDFpu7MUUvbuZU/M
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ within.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DpEditor.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion within.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion within.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DpEditor.exe -
Deletes itself 1 IoCs
pid Process 1740 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1580 within.exe 1292 DpEditor.exe -
Loads dropped DLL 2 IoCs
pid Process 1180 cmd.exe 1580 within.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000600000001531c-149.dat themida behavioral1/files/0x000600000001531c-150.dat themida behavioral1/files/0x000600000001531c-151.dat themida behavioral1/memory/1580-152-0x0000000001320000-0x0000000001A02000-memory.dmp themida behavioral1/memory/1580-153-0x0000000001320000-0x0000000001A02000-memory.dmp themida behavioral1/memory/1580-154-0x0000000001320000-0x0000000001A02000-memory.dmp themida behavioral1/memory/1580-155-0x0000000001320000-0x0000000001A02000-memory.dmp themida behavioral1/memory/1580-157-0x0000000001320000-0x0000000001A02000-memory.dmp themida behavioral1/files/0x0006000000015588-160.dat themida behavioral1/memory/1580-163-0x0000000001320000-0x0000000001A02000-memory.dmp themida behavioral1/files/0x0006000000015588-164.dat themida behavioral1/memory/1292-165-0x0000000000DB0000-0x0000000001492000-memory.dmp themida behavioral1/memory/1292-167-0x0000000000DB0000-0x0000000001492000-memory.dmp themida behavioral1/memory/1292-166-0x0000000000DB0000-0x0000000001492000-memory.dmp themida behavioral1/memory/1292-168-0x0000000000DB0000-0x0000000001492000-memory.dmp themida behavioral1/memory/1292-169-0x0000000000DB0000-0x0000000001492000-memory.dmp themida behavioral1/memory/1292-171-0x0000000000DB0000-0x0000000001492000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA within.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DpEditor.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 964210bbe9ccdd4289aafb49fe2eba8f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 964210bbe9ccdd4289aafb49fe2eba8f.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1580 within.exe 1292 DpEditor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 964210bbe9ccdd4289aafb49fe2eba8f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 964210bbe9ccdd4289aafb49fe2eba8f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 964210bbe9ccdd4289aafb49fe2eba8f.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 324 timeout.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1292 DpEditor.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1236 964210bbe9ccdd4289aafb49fe2eba8f.exe 1236 964210bbe9ccdd4289aafb49fe2eba8f.exe 1580 within.exe 1292 DpEditor.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1236 wrote to memory of 1180 1236 964210bbe9ccdd4289aafb49fe2eba8f.exe 27 PID 1236 wrote to memory of 1180 1236 964210bbe9ccdd4289aafb49fe2eba8f.exe 27 PID 1236 wrote to memory of 1180 1236 964210bbe9ccdd4289aafb49fe2eba8f.exe 27 PID 1236 wrote to memory of 1180 1236 964210bbe9ccdd4289aafb49fe2eba8f.exe 27 PID 1236 wrote to memory of 1740 1236 964210bbe9ccdd4289aafb49fe2eba8f.exe 29 PID 1236 wrote to memory of 1740 1236 964210bbe9ccdd4289aafb49fe2eba8f.exe 29 PID 1236 wrote to memory of 1740 1236 964210bbe9ccdd4289aafb49fe2eba8f.exe 29 PID 1236 wrote to memory of 1740 1236 964210bbe9ccdd4289aafb49fe2eba8f.exe 29 PID 1740 wrote to memory of 324 1740 cmd.exe 31 PID 1740 wrote to memory of 324 1740 cmd.exe 31 PID 1740 wrote to memory of 324 1740 cmd.exe 31 PID 1740 wrote to memory of 324 1740 cmd.exe 31 PID 1180 wrote to memory of 1580 1180 cmd.exe 32 PID 1180 wrote to memory of 1580 1180 cmd.exe 32 PID 1180 wrote to memory of 1580 1180 cmd.exe 32 PID 1180 wrote to memory of 1580 1180 cmd.exe 32 PID 1580 wrote to memory of 1292 1580 within.exe 33 PID 1580 wrote to memory of 1292 1580 within.exe 33 PID 1580 wrote to memory of 1292 1580 within.exe 33 PID 1580 wrote to memory of 1292 1580 within.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\964210bbe9ccdd4289aafb49fe2eba8f.exe"C:\Users\Admin\AppData\Local\Temp\964210bbe9ccdd4289aafb49fe2eba8f.exe"1⤵
- Maps connected drives based on registry
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Roaming\A5347EE2CDEFBA94\within.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Roaming\A5347EE2CDEFBA94\within.exeC:\Users\Admin\AppData\Roaming\A5347EE2CDEFBA94\within.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:1292
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout -t 5 && del "C:\Users\Admin\AppData\Local\Temp\964210bbe9ccdd4289aafb49fe2eba8f.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\timeout.exetimeout -t 53⤵
- Delays execution with timeout.exe
PID:324
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD50bbf74f0949aafa4bfd20ff65ac39725
SHA1db3b6ece625c1946ca70943ce7c83f0f44d01b8d
SHA2569822a5194a3aee6a62472654f3a5a8e1e409f48450f4b1e589092aa22afba1ea
SHA5120177b6f71662249fb9af79a7ba584a39b3b808b92bc80372d4362ec1fc580c0f2303e0ee7af9d3b6251fa0c6e3150dbb9f18ad27ba6e791c9a0ddde3a9993551
-
Filesize
71KB
MD5e5e23f78017d1e6eddfc8480e1679ee4
SHA10667bd1b7129b105bd2c66ef6ad54c9648aec072
SHA2564fed2f4c33a3876390d8520f184062927aca8e0ce3538127de3a2f66ea856d91
SHA512b1260e7ba7ad6d5dd0daeabc5f7cc1fc7a2e9259092f8d70d3d9eed923ed8aa60adcce4c27e9cb20966d500ed59edaaba9570f01d6a84180f1fb83e7b5c20049
-
Filesize
2.6MB
MD5e4303381a01351db668a0463c219a9b9
SHA1be696a2ea3c69c6484e89656ded38078164a273c
SHA2568c49a9eb88ad9039a5d279cc45d8e33f77299eda14f21828d67931b9c386acca
SHA512d6c858d7f6df62d434214b54aa737ce49f1392dc39080454b0623d753a4fbc5c85cb9f7ffddf215e37ae2b859d28955f1aba245bbe732968f1df842d75ea8ebc
-
Filesize
2.6MB
MD5e4303381a01351db668a0463c219a9b9
SHA1be696a2ea3c69c6484e89656ded38078164a273c
SHA2568c49a9eb88ad9039a5d279cc45d8e33f77299eda14f21828d67931b9c386acca
SHA512d6c858d7f6df62d434214b54aa737ce49f1392dc39080454b0623d753a4fbc5c85cb9f7ffddf215e37ae2b859d28955f1aba245bbe732968f1df842d75ea8ebc
-
Filesize
2.6MB
MD5e4303381a01351db668a0463c219a9b9
SHA1be696a2ea3c69c6484e89656ded38078164a273c
SHA2568c49a9eb88ad9039a5d279cc45d8e33f77299eda14f21828d67931b9c386acca
SHA512d6c858d7f6df62d434214b54aa737ce49f1392dc39080454b0623d753a4fbc5c85cb9f7ffddf215e37ae2b859d28955f1aba245bbe732968f1df842d75ea8ebc
-
Filesize
2.6MB
MD5e4303381a01351db668a0463c219a9b9
SHA1be696a2ea3c69c6484e89656ded38078164a273c
SHA2568c49a9eb88ad9039a5d279cc45d8e33f77299eda14f21828d67931b9c386acca
SHA512d6c858d7f6df62d434214b54aa737ce49f1392dc39080454b0623d753a4fbc5c85cb9f7ffddf215e37ae2b859d28955f1aba245bbe732968f1df842d75ea8ebc
-
Filesize
2.6MB
MD5e4303381a01351db668a0463c219a9b9
SHA1be696a2ea3c69c6484e89656ded38078164a273c
SHA2568c49a9eb88ad9039a5d279cc45d8e33f77299eda14f21828d67931b9c386acca
SHA512d6c858d7f6df62d434214b54aa737ce49f1392dc39080454b0623d753a4fbc5c85cb9f7ffddf215e37ae2b859d28955f1aba245bbe732968f1df842d75ea8ebc