Analysis

  • max time kernel
    146s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/03/2023, 08:08

General

  • Target

    9963b0e73b230fc8ae641458d21a151f8297d5e355a6ccd5d899a19a3ea90c6e.exe

  • Size

    3.4MB

  • MD5

    d2dea5ce9b1ba045c3ddb6eedd6e2ea3

  • SHA1

    90041eed603262ad58e7e217d4a31add1f2e3673

  • SHA256

    9963b0e73b230fc8ae641458d21a151f8297d5e355a6ccd5d899a19a3ea90c6e

  • SHA512

    c31ea95b362d38d60d508f8e750bcd9fe64f616f6d325a5bb6c76805a140ef1b80ea2f546f9fb44af69ceb257abf58bc4333335d340ab6dd6ce51d5b28b58444

  • SSDEEP

    49152:2r1c7Kvf8e9HTgXHXayMSTQ5c1ztH9rDDQvOJRg05T0Oa/rm2ho8IucxzrurVlo9:dKvfd94XayMT5sH9M0aS8o9uWyUhHyk

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Modifies file permissions 1 TTPs 3 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9963b0e73b230fc8ae641458d21a151f8297d5e355a6ccd5d899a19a3ea90c6e.exe
    "C:\Users\Admin\AppData\Local\Temp\9963b0e73b230fc8ae641458d21a151f8297d5e355a6ccd5d899a19a3ea90c6e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4116
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4236
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:2060
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6" /inheritance:e /deny "admin:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:2080
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:1444
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /CREATE /TN "USOPrivateSoftwareDistribution-type6.0.3.6\USOPrivateSoftwareDistribution-type6.0.3.6" /TR "C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6\USOPrivateSoftwareDistribution-type6.0.3.6.exe" /SC MINUTE
        3⤵
        • Creates scheduled task(s)
        PID:4164
      • C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6\USOPrivateSoftwareDistribution-type6.0.3.6.exe
        "C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6\USOPrivateSoftwareDistribution-type6.0.3.6.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        PID:3748
  • C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6\USOPrivateSoftwareDistribution-type6.0.3.6.exe
    C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6\USOPrivateSoftwareDistribution-type6.0.3.6.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Checks whether UAC is enabled
    PID:1076

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6\USOPrivateSoftwareDistribution-type6.0.3.6.exe

    Filesize

    717.1MB

    MD5

    93434efd5ee90407915a0d50c130d35f

    SHA1

    24db2914d8251186b42943f6e39197aef4e132e2

    SHA256

    9d2e4326e3cb61798f10c09783a473d83a250a709495641edab044a26b5f9efb

    SHA512

    1e609bc25223525be605aafcf3b212e08fb44a25a4aa88f5480019fd02909674c11a292032384a897ebebf70af6ccc50713d8577f2507bd8b609a2004b7ab850

  • C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6\USOPrivateSoftwareDistribution-type6.0.3.6.exe

    Filesize

    717.1MB

    MD5

    93434efd5ee90407915a0d50c130d35f

    SHA1

    24db2914d8251186b42943f6e39197aef4e132e2

    SHA256

    9d2e4326e3cb61798f10c09783a473d83a250a709495641edab044a26b5f9efb

    SHA512

    1e609bc25223525be605aafcf3b212e08fb44a25a4aa88f5480019fd02909674c11a292032384a897ebebf70af6ccc50713d8577f2507bd8b609a2004b7ab850

  • C:\ProgramData\USOPrivateSoftwareDistribution-type6.0.3.6\USOPrivateSoftwareDistribution-type6.0.3.6.exe

    Filesize

    489.9MB

    MD5

    fbf6ce53e7eb7b7a5be1efb11cf4fb28

    SHA1

    494074210d6ed09fe0c9ac66e704a5c527d352ca

    SHA256

    2d1fc08c664c7ff81f21462db61afe73e732bc5b2f312f35f40c1d5a7078bff5

    SHA512

    af53329f167d8b9875882224ad880dfe799e2d51700472b091c8f4188c88a58a065ca7737d28a4009038abb093abb499c936dff40c6b34b92ca2af3c920133c1

  • memory/1076-154-0x00007FF75F060000-0x00007FF75F57F000-memory.dmp

    Filesize

    5.1MB

  • memory/1076-153-0x00007FF75F060000-0x00007FF75F57F000-memory.dmp

    Filesize

    5.1MB

  • memory/1076-152-0x00007FF75F060000-0x00007FF75F57F000-memory.dmp

    Filesize

    5.1MB

  • memory/3748-150-0x00007FF75F060000-0x00007FF75F57F000-memory.dmp

    Filesize

    5.1MB

  • memory/3748-145-0x00007FF75F060000-0x00007FF75F57F000-memory.dmp

    Filesize

    5.1MB

  • memory/3748-148-0x00007FF75F060000-0x00007FF75F57F000-memory.dmp

    Filesize

    5.1MB

  • memory/3748-149-0x00007FF75F060000-0x00007FF75F57F000-memory.dmp

    Filesize

    5.1MB

  • memory/4236-128-0x00000000097D0000-0x00000000097E0000-memory.dmp

    Filesize

    64KB

  • memory/4236-127-0x00000000097D0000-0x00000000097E0000-memory.dmp

    Filesize

    64KB

  • memory/4236-116-0x0000000000400000-0x000000000075C000-memory.dmp

    Filesize

    3.4MB

  • memory/4236-126-0x00000000097D0000-0x00000000097E0000-memory.dmp

    Filesize

    64KB

  • memory/4236-125-0x0000000009500000-0x000000000950A000-memory.dmp

    Filesize

    40KB

  • memory/4236-124-0x0000000009580000-0x0000000009612000-memory.dmp

    Filesize

    584KB

  • memory/4236-123-0x00000000099E0000-0x0000000009EDE000-memory.dmp

    Filesize

    5.0MB