Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
19/03/2023, 08:08
Static task
static1
General
-
Target
9963b0e73b230fc8ae641458d21a151f8297d5e355a6ccd5d899a19a3ea90c6e.exe
-
Size
3.4MB
-
MD5
d2dea5ce9b1ba045c3ddb6eedd6e2ea3
-
SHA1
90041eed603262ad58e7e217d4a31add1f2e3673
-
SHA256
9963b0e73b230fc8ae641458d21a151f8297d5e355a6ccd5d899a19a3ea90c6e
-
SHA512
c31ea95b362d38d60d508f8e750bcd9fe64f616f6d325a5bb6c76805a140ef1b80ea2f546f9fb44af69ceb257abf58bc4333335d340ab6dd6ce51d5b28b58444
-
SSDEEP
49152:2r1c7Kvf8e9HTgXHXayMSTQ5c1ztH9rDDQvOJRg05T0Oa/rm2ho8IucxzrurVlo9:dKvfd94XayMT5sH9M0aS8o9uWyUhHyk
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ USOPrivateSoftwareDistribution-type6.0.3.6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ USOPrivateSoftwareDistribution-type6.0.3.6.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion USOPrivateSoftwareDistribution-type6.0.3.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion USOPrivateSoftwareDistribution-type6.0.3.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion USOPrivateSoftwareDistribution-type6.0.3.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion USOPrivateSoftwareDistribution-type6.0.3.6.exe -
Executes dropped EXE 2 IoCs
pid Process 3748 USOPrivateSoftwareDistribution-type6.0.3.6.exe 1076 USOPrivateSoftwareDistribution-type6.0.3.6.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 2060 icacls.exe 2080 icacls.exe 1444 icacls.exe -
resource yara_rule behavioral1/files/0x000900000001ae77-143.dat upx behavioral1/files/0x000900000001ae77-144.dat upx behavioral1/memory/3748-145-0x00007FF75F060000-0x00007FF75F57F000-memory.dmp upx behavioral1/memory/3748-148-0x00007FF75F060000-0x00007FF75F57F000-memory.dmp upx behavioral1/memory/3748-149-0x00007FF75F060000-0x00007FF75F57F000-memory.dmp upx behavioral1/memory/3748-150-0x00007FF75F060000-0x00007FF75F57F000-memory.dmp upx behavioral1/files/0x000900000001ae77-151.dat upx behavioral1/memory/1076-152-0x00007FF75F060000-0x00007FF75F57F000-memory.dmp upx behavioral1/memory/1076-153-0x00007FF75F060000-0x00007FF75F57F000-memory.dmp upx behavioral1/memory/1076-154-0x00007FF75F060000-0x00007FF75F57F000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA USOPrivateSoftwareDistribution-type6.0.3.6.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA USOPrivateSoftwareDistribution-type6.0.3.6.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4116 set thread context of 4236 4116 9963b0e73b230fc8ae641458d21a151f8297d5e355a6ccd5d899a19a3ea90c6e.exe 67 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4164 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4116 wrote to memory of 4236 4116 9963b0e73b230fc8ae641458d21a151f8297d5e355a6ccd5d899a19a3ea90c6e.exe 67 PID 4116 wrote to memory of 4236 4116 9963b0e73b230fc8ae641458d21a151f8297d5e355a6ccd5d899a19a3ea90c6e.exe 67 PID 4116 wrote to memory of 4236 4116 9963b0e73b230fc8ae641458d21a151f8297d5e355a6ccd5d899a19a3ea90c6e.exe 67 PID 4116 wrote to memory of 4236 4116 9963b0e73b230fc8ae641458d21a151f8297d5e355a6ccd5d899a19a3ea90c6e.exe 67 PID 4116 wrote to memory of 4236 4116 9963b0e73b230fc8ae641458d21a151f8297d5e355a6ccd5d899a19a3ea90c6e.exe 67 PID 4236 wrote to memory of 2060 4236 AppLaunch.exe 68 PID 4236 wrote to memory of 2060 4236 AppLaunch.exe 68 PID 4236 wrote to memory of 2060 4236 AppLaunch.exe 68 PID 4236 wrote to memory of 1444 4236 AppLaunch.exe 73 PID 4236 wrote to memory of 1444 4236 AppLaunch.exe 73 PID 4236 wrote to memory of 1444 4236 AppLaunch.exe 73 PID 4236 wrote to memory of 2080 4236 AppLaunch.exe 71 PID 4236 wrote to memory of 2080 4236 AppLaunch.exe 71 PID 4236 wrote to memory of 2080 4236 AppLaunch.exe 71 PID 4236 wrote to memory of 4164 4236 AppLaunch.exe 74 PID 4236 wrote to memory of 4164 4236 AppLaunch.exe 74 PID 4236 wrote to memory of 4164 4236 AppLaunch.exe 74 PID 4236 wrote to memory of 3748 4236 AppLaunch.exe 76 PID 4236 wrote to memory of 3748 4236 AppLaunch.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\9963b0e73b230fc8ae641458d21a151f8297d5e355a6ccd5d899a19a3ea90c6e.exe"C:\Users\Admin\AppData\Local\Temp\9963b0e73b230fc8ae641458d21a151f8297d5e355a6ccd5d899a19a3ea90c6e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:2060
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:2080
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:1444
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "USOPrivateSoftwareDistribution-type6.0.3.6\USOPrivateSoftwareDistribution-type6.0.3.6" /TR "C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6\USOPrivateSoftwareDistribution-type6.0.3.6.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:4164
-
-
C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6\USOPrivateSoftwareDistribution-type6.0.3.6.exe"C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6\USOPrivateSoftwareDistribution-type6.0.3.6.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3748
-
-
-
C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6\USOPrivateSoftwareDistribution-type6.0.3.6.exeC:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6\USOPrivateSoftwareDistribution-type6.0.3.6.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6\USOPrivateSoftwareDistribution-type6.0.3.6.exe
Filesize717.1MB
MD593434efd5ee90407915a0d50c130d35f
SHA124db2914d8251186b42943f6e39197aef4e132e2
SHA2569d2e4326e3cb61798f10c09783a473d83a250a709495641edab044a26b5f9efb
SHA5121e609bc25223525be605aafcf3b212e08fb44a25a4aa88f5480019fd02909674c11a292032384a897ebebf70af6ccc50713d8577f2507bd8b609a2004b7ab850
-
C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6\USOPrivateSoftwareDistribution-type6.0.3.6.exe
Filesize717.1MB
MD593434efd5ee90407915a0d50c130d35f
SHA124db2914d8251186b42943f6e39197aef4e132e2
SHA2569d2e4326e3cb61798f10c09783a473d83a250a709495641edab044a26b5f9efb
SHA5121e609bc25223525be605aafcf3b212e08fb44a25a4aa88f5480019fd02909674c11a292032384a897ebebf70af6ccc50713d8577f2507bd8b609a2004b7ab850
-
C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6\USOPrivateSoftwareDistribution-type6.0.3.6.exe
Filesize489.9MB
MD5fbf6ce53e7eb7b7a5be1efb11cf4fb28
SHA1494074210d6ed09fe0c9ac66e704a5c527d352ca
SHA2562d1fc08c664c7ff81f21462db61afe73e732bc5b2f312f35f40c1d5a7078bff5
SHA512af53329f167d8b9875882224ad880dfe799e2d51700472b091c8f4188c88a58a065ca7737d28a4009038abb093abb499c936dff40c6b34b92ca2af3c920133c1