Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2023, 17:36
Static task
static1
General
-
Target
41ebe10814e3228c694332f6962bfe281659031ea52dbf8c473c0c9718c0ff64.exe
-
Size
3.4MB
-
MD5
fb2d981679e96c837234ab2324b03b15
-
SHA1
629a7bfee589f09d9a8072d43d41ccad7aa13791
-
SHA256
41ebe10814e3228c694332f6962bfe281659031ea52dbf8c473c0c9718c0ff64
-
SHA512
0b14393f6877afed1f010e2f2a1df50ce08c3c385b756ff5e1c9557a84113ae6cd405097fce104174df9556591ecb6967fad251203fa42f57df3e55d25e846e9
-
SSDEEP
98304:PB/hPovhl+YHt0DJSZtAzc/K9gMus7RfRwUIq8DuznQ6:PzQm6EJzxl7RJwk8DuznQ6
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5.exe -
Executes dropped EXE 2 IoCs
pid Process 3108 Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5.exe 1956 Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 404 icacls.exe 5080 icacls.exe 1572 icacls.exe -
resource yara_rule behavioral1/files/0x0006000000023152-152.dat upx behavioral1/files/0x0006000000023152-149.dat upx behavioral1/files/0x0006000000023152-151.dat upx behavioral1/memory/3108-154-0x00007FF7BDFE0000-0x00007FF7BE4FF000-memory.dmp upx behavioral1/memory/3108-155-0x00007FF7BDFE0000-0x00007FF7BE4FF000-memory.dmp upx behavioral1/memory/3108-156-0x00007FF7BDFE0000-0x00007FF7BE4FF000-memory.dmp upx behavioral1/memory/3108-157-0x00007FF7BDFE0000-0x00007FF7BE4FF000-memory.dmp upx behavioral1/memory/3108-158-0x00007FF7BDFE0000-0x00007FF7BE4FF000-memory.dmp upx behavioral1/memory/3108-159-0x00007FF7BDFE0000-0x00007FF7BE4FF000-memory.dmp upx behavioral1/files/0x0006000000023152-161.dat upx behavioral1/memory/1956-162-0x00007FF7BDFE0000-0x00007FF7BE4FF000-memory.dmp upx behavioral1/memory/1956-163-0x00007FF7BDFE0000-0x00007FF7BE4FF000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1264 set thread context of 1104 1264 41ebe10814e3228c694332f6962bfe281659031ea52dbf8c473c0c9718c0ff64.exe 87 -
Program crash 1 IoCs
pid pid_target Process procid_target 3376 1264 WerFault.exe 85 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3752 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1104 1264 41ebe10814e3228c694332f6962bfe281659031ea52dbf8c473c0c9718c0ff64.exe 87 PID 1264 wrote to memory of 1104 1264 41ebe10814e3228c694332f6962bfe281659031ea52dbf8c473c0c9718c0ff64.exe 87 PID 1264 wrote to memory of 1104 1264 41ebe10814e3228c694332f6962bfe281659031ea52dbf8c473c0c9718c0ff64.exe 87 PID 1264 wrote to memory of 1104 1264 41ebe10814e3228c694332f6962bfe281659031ea52dbf8c473c0c9718c0ff64.exe 87 PID 1264 wrote to memory of 1104 1264 41ebe10814e3228c694332f6962bfe281659031ea52dbf8c473c0c9718c0ff64.exe 87 PID 1104 wrote to memory of 5080 1104 AppLaunch.exe 96 PID 1104 wrote to memory of 5080 1104 AppLaunch.exe 96 PID 1104 wrote to memory of 5080 1104 AppLaunch.exe 96 PID 1104 wrote to memory of 1572 1104 AppLaunch.exe 98 PID 1104 wrote to memory of 1572 1104 AppLaunch.exe 98 PID 1104 wrote to memory of 1572 1104 AppLaunch.exe 98 PID 1104 wrote to memory of 404 1104 AppLaunch.exe 100 PID 1104 wrote to memory of 404 1104 AppLaunch.exe 100 PID 1104 wrote to memory of 404 1104 AppLaunch.exe 100 PID 1104 wrote to memory of 3752 1104 AppLaunch.exe 102 PID 1104 wrote to memory of 3752 1104 AppLaunch.exe 102 PID 1104 wrote to memory of 3752 1104 AppLaunch.exe 102 PID 1104 wrote to memory of 3108 1104 AppLaunch.exe 104 PID 1104 wrote to memory of 3108 1104 AppLaunch.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\41ebe10814e3228c694332f6962bfe281659031ea52dbf8c473c0c9718c0ff64.exe"C:\Users\Admin\AppData\Local\Temp\41ebe10814e3228c694332f6962bfe281659031ea52dbf8c473c0c9718c0ff64.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:5080
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:1572
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:404
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5" /TR "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:3752
-
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5.exe"C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3108
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 2722⤵
- Program crash
PID:3376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1264 -ip 12641⤵PID:1108
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5.exeC:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1956
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5.exe
Filesize669.1MB
MD5834aba74f4d92258ac247d688a455f44
SHA1f04917fb3d0dd499c4a33e900f1c9afff5766a3e
SHA256b386068efb9c76215e692ce280972912eefa8bae0faa2ee0cff55037b9767829
SHA512586fe9d861d58b5a12f2019b6a8db8a1d8b0a1435ee19a004fce419beda2ce3368af24cddf175f15f74e909fedf4b21b6038dee7ec6d0e2e837e2e228a896846
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5.exe
Filesize661.2MB
MD53572c33c289422c76142329c6fbbc471
SHA14720a93eb80607de0cc848455690aed4fd36eafd
SHA2566bfb3f059b8761939f35f11d7aad6f4fd5b2312b9bb6165592099edbacce5a84
SHA512acaed2c704006e65740370beb48791d6ec3415055ca0bcf21411641bc269363d0b84a76667ac4c0e68b455163163e37713dc622cf915d56f8f801f94de735f01
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5.exe
Filesize668.3MB
MD510b3e7be5f2bf0795e39c8be80fa8d2d
SHA1ad779d78f3e2efad0d12f8aaf4986c5c23391e85
SHA256e8d4126e98e9e9fb301acab972b9e0e74424bb5e5829da2fe575f408fb7af848
SHA512023211d5e23c1e672bed681cabfdd59bd3a9aca8371fbe87febba59e399a847c6951182cb35d745d6c02b37e0367996af7154010ae08ae0ec20fed4c3fd126ed
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type1.5.0.5.exe
Filesize25.9MB
MD5b8d509bd6c4f0da3f3a2d7034ce4b864
SHA1af28d31715d4f59fae1506ef5e21fe74b10f1807
SHA25658d0d8f1431c54e53b9ca97e20fec94e627b9fb94564f09799f9a3be53913e6c
SHA512a2fa3fb1faecb7c69b833789b7d1f3826c0dfcae1ac71c3e0b8f445d2c2a3809db750edb18209af9f740935746bb718f9b1877fa2d80cd1b95525492ce8af09d