Analysis
-
max time kernel
298s -
max time network
184s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
19/03/2023, 22:17
Static task
static1
Behavioral task
behavioral1
Sample
37b3ea1526a83ea5f65ae24d0d5cc180d4f21d1d8e8114e8eaa5b9f6577423ec.exe
Resource
win7-20230220-en
General
-
Target
37b3ea1526a83ea5f65ae24d0d5cc180d4f21d1d8e8114e8eaa5b9f6577423ec.exe
-
Size
3.4MB
-
MD5
d9ec59dc2b480fd37139f08cce7fed33
-
SHA1
25e896392964466e54159e5b9678cf69c134aa24
-
SHA256
37b3ea1526a83ea5f65ae24d0d5cc180d4f21d1d8e8114e8eaa5b9f6577423ec
-
SHA512
222842ff347e0572cd81770a207c6400d27d56c03335e2f1ba963af25bca58ecdec690b599f871c2a2e8d7699fb28e7d8aaeca3c576d8dcde57396732f9eaa04
-
SSDEEP
49152:Jr1c7Kvf8e9HTgXHXayMSTQ5c1ztH9rDDQvOJRg05T0Oa/rm2ho8IucxzrurVlo5:CKvfd94XayMT5sH9M0aS8o9uWyUhHyY
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SoftwareDistributionWindowsHolographicDevices-type0.6.7.3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SoftwareDistributionWindowsHolographicDevices-type0.6.7.3.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SoftwareDistributionWindowsHolographicDevices-type0.6.7.3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SoftwareDistributionWindowsHolographicDevices-type0.6.7.3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SoftwareDistributionWindowsHolographicDevices-type0.6.7.3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SoftwareDistributionWindowsHolographicDevices-type0.6.7.3.exe -
Executes dropped EXE 2 IoCs
pid Process 3504 SoftwareDistributionWindowsHolographicDevices-type0.6.7.3.exe 4740 SoftwareDistributionWindowsHolographicDevices-type0.6.7.3.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 2432 icacls.exe 3592 icacls.exe 2800 icacls.exe -
resource yara_rule behavioral2/files/0x000900000001af1e-148.dat upx behavioral2/files/0x000900000001af1e-149.dat upx behavioral2/memory/3504-151-0x00007FF7DFC00000-0x00007FF7E011F000-memory.dmp upx behavioral2/memory/3504-153-0x00007FF7DFC00000-0x00007FF7E011F000-memory.dmp upx behavioral2/memory/3504-154-0x00007FF7DFC00000-0x00007FF7E011F000-memory.dmp upx behavioral2/memory/3504-155-0x00007FF7DFC00000-0x00007FF7E011F000-memory.dmp upx behavioral2/memory/3504-156-0x00007FF7DFC00000-0x00007FF7E011F000-memory.dmp upx behavioral2/files/0x000900000001af1e-157.dat upx behavioral2/memory/4740-158-0x00007FF7DFC00000-0x00007FF7E011F000-memory.dmp upx behavioral2/memory/4740-159-0x00007FF7DFC00000-0x00007FF7E011F000-memory.dmp upx behavioral2/memory/4740-160-0x00007FF7DFC00000-0x00007FF7E011F000-memory.dmp upx behavioral2/memory/4740-161-0x00007FF7DFC00000-0x00007FF7E011F000-memory.dmp upx behavioral2/memory/4740-162-0x00007FF7DFC00000-0x00007FF7E011F000-memory.dmp upx behavioral2/memory/4740-163-0x00007FF7DFC00000-0x00007FF7E011F000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SoftwareDistributionWindowsHolographicDevices-type0.6.7.3.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SoftwareDistributionWindowsHolographicDevices-type0.6.7.3.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2436 set thread context of 2940 2436 37b3ea1526a83ea5f65ae24d0d5cc180d4f21d1d8e8114e8eaa5b9f6577423ec.exe 67 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4664 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2940 2436 37b3ea1526a83ea5f65ae24d0d5cc180d4f21d1d8e8114e8eaa5b9f6577423ec.exe 67 PID 2436 wrote to memory of 2940 2436 37b3ea1526a83ea5f65ae24d0d5cc180d4f21d1d8e8114e8eaa5b9f6577423ec.exe 67 PID 2436 wrote to memory of 2940 2436 37b3ea1526a83ea5f65ae24d0d5cc180d4f21d1d8e8114e8eaa5b9f6577423ec.exe 67 PID 2436 wrote to memory of 2940 2436 37b3ea1526a83ea5f65ae24d0d5cc180d4f21d1d8e8114e8eaa5b9f6577423ec.exe 67 PID 2436 wrote to memory of 2940 2436 37b3ea1526a83ea5f65ae24d0d5cc180d4f21d1d8e8114e8eaa5b9f6577423ec.exe 67 PID 2940 wrote to memory of 2800 2940 AppLaunch.exe 68 PID 2940 wrote to memory of 2800 2940 AppLaunch.exe 68 PID 2940 wrote to memory of 2800 2940 AppLaunch.exe 68 PID 2940 wrote to memory of 2432 2940 AppLaunch.exe 70 PID 2940 wrote to memory of 2432 2940 AppLaunch.exe 70 PID 2940 wrote to memory of 2432 2940 AppLaunch.exe 70 PID 2940 wrote to memory of 3592 2940 AppLaunch.exe 71 PID 2940 wrote to memory of 3592 2940 AppLaunch.exe 71 PID 2940 wrote to memory of 3592 2940 AppLaunch.exe 71 PID 2940 wrote to memory of 4664 2940 AppLaunch.exe 73 PID 2940 wrote to memory of 4664 2940 AppLaunch.exe 73 PID 2940 wrote to memory of 4664 2940 AppLaunch.exe 73 PID 2940 wrote to memory of 3504 2940 AppLaunch.exe 76 PID 2940 wrote to memory of 3504 2940 AppLaunch.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\37b3ea1526a83ea5f65ae24d0d5cc180d4f21d1d8e8114e8eaa5b9f6577423ec.exe"C:\Users\Admin\AppData\Local\Temp\37b3ea1526a83ea5f65ae24d0d5cc180d4f21d1d8e8114e8eaa5b9f6577423ec.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\SoftwareDistributionWindowsHolographicDevices-type0.6.7.3" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:2800
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\SoftwareDistributionWindowsHolographicDevices-type0.6.7.3" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:2432
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\SoftwareDistributionWindowsHolographicDevices-type0.6.7.3" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:3592
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "SoftwareDistributionWindowsHolographicDevices-type0.6.7.3\SoftwareDistributionWindowsHolographicDevices-type0.6.7.3" /TR "C:\ProgramData\SoftwareDistributionWindowsHolographicDevices-type0.6.7.3\SoftwareDistributionWindowsHolographicDevices-type0.6.7.3.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:4664
-
-
C:\ProgramData\SoftwareDistributionWindowsHolographicDevices-type0.6.7.3\SoftwareDistributionWindowsHolographicDevices-type0.6.7.3.exe"C:\ProgramData\SoftwareDistributionWindowsHolographicDevices-type0.6.7.3\SoftwareDistributionWindowsHolographicDevices-type0.6.7.3.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3504
-
-
-
C:\ProgramData\SoftwareDistributionWindowsHolographicDevices-type0.6.7.3\SoftwareDistributionWindowsHolographicDevices-type0.6.7.3.exeC:\ProgramData\SoftwareDistributionWindowsHolographicDevices-type0.6.7.3\SoftwareDistributionWindowsHolographicDevices-type0.6.7.3.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4740
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\SoftwareDistributionWindowsHolographicDevices-type0.6.7.3\SoftwareDistributionWindowsHolographicDevices-type0.6.7.3.exe
Filesize198.9MB
MD5840846d7f6e3e6e27df6128b7a8f666d
SHA1fdaad130470558f002176c9d4393333420ad052f
SHA256d4851c937e962c89bfc86d4b181501638b762137f6c15b1ddfb85f8eb0344219
SHA5121b0f9ac6bad2d48209054a5db000d64d6ca16107bd3ac190ea9677de47a313d27986ad5f01dce8439db2d225ed7ebb9c48d95ccaa6ce79ebd9f996905dddfd87
-
C:\ProgramData\SoftwareDistributionWindowsHolographicDevices-type0.6.7.3\SoftwareDistributionWindowsHolographicDevices-type0.6.7.3.exe
Filesize194.3MB
MD5de3385420ee88678766cb39d98d557be
SHA161cbc8afe3f532db3f4feb406e999c007af12e00
SHA2564f1f5e3ea0dc37a7fb876de242dac6aaacbbedc23f3f9bcfa09eed1a69295fd3
SHA512f72b9245f8ec480aeea6bc7ddc9ebb7392b307aeb157e9d61eaff9a941a73ce4f0db658e2ff7a5aca932aa620384bc203399e584e486d25a44eff60a303de7b3
-
C:\ProgramData\SoftwareDistributionWindowsHolographicDevices-type0.6.7.3\SoftwareDistributionWindowsHolographicDevices-type0.6.7.3.exe
Filesize151.9MB
MD55436953dbb3a1fdc2c2d0371b4742391
SHA16399e3bb29962edca65be4b08402e83f865b7346
SHA256e424b4a923ddcad0afcccef0144346095737bce8d036a7f0dafed29460ab3713
SHA5125dbf229e538e9fdb1975f3bc5f57852f32e3a443ec589ffa803ffd9e93ab61cdb92af0660e60e524012c83c97c2aad54de5a6f0999cff7d58017c96ef17bbe91