Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2023, 13:01
Static task
static1
General
-
Target
f0c20ded1d665938de180c8519a90254949af29f346cc763195ca9c41abadafa.exe
-
Size
3.4MB
-
MD5
3f062c179088905caa034b2b7581d160
-
SHA1
da04dc55bae78506d62e61db03198b4c5e613ded
-
SHA256
f0c20ded1d665938de180c8519a90254949af29f346cc763195ca9c41abadafa
-
SHA512
e907627eab4121d040cfc40afedaf9239582f6ec5d1909ac84e3d39dfb11de720762ea5b7131677230b5695c08b6a1cb7c6d7ab43c479b8db8560613559b68e9
-
SSDEEP
98304:+nB/hPovhl+YHt0DJSZtAzc/K9gMus7RfRwUIq8DuznQ6:ozQm6EJzxl7RJwk8DuznQ6
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ USOSharedssh-type8.6.4.0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ USOSharedssh-type8.6.4.0.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion USOSharedssh-type8.6.4.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion USOSharedssh-type8.6.4.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion USOSharedssh-type8.6.4.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion USOSharedssh-type8.6.4.0.exe -
Executes dropped EXE 2 IoCs
pid Process 4024 USOSharedssh-type8.6.4.0.exe 4464 USOSharedssh-type8.6.4.0.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 1620 icacls.exe 848 icacls.exe 2064 icacls.exe -
resource yara_rule behavioral1/files/0x000a000000023164-149.dat upx behavioral1/files/0x000a000000023164-150.dat upx behavioral1/memory/4024-153-0x00007FF7CFE40000-0x00007FF7D035F000-memory.dmp upx behavioral1/memory/4024-152-0x00007FF7CFE40000-0x00007FF7D035F000-memory.dmp upx behavioral1/memory/4024-154-0x00007FF7CFE40000-0x00007FF7D035F000-memory.dmp upx behavioral1/memory/4024-155-0x00007FF7CFE40000-0x00007FF7D035F000-memory.dmp upx behavioral1/files/0x000a000000023164-156.dat upx behavioral1/memory/4464-157-0x00007FF7CFE40000-0x00007FF7D035F000-memory.dmp upx behavioral1/memory/4464-159-0x00007FF7CFE40000-0x00007FF7D035F000-memory.dmp upx behavioral1/memory/4464-160-0x00007FF7CFE40000-0x00007FF7D035F000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA USOSharedssh-type8.6.4.0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA USOSharedssh-type8.6.4.0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1112 set thread context of 2996 1112 f0c20ded1d665938de180c8519a90254949af29f346cc763195ca9c41abadafa.exe 87 -
Program crash 1 IoCs
pid pid_target Process procid_target 2572 1112 WerFault.exe 85 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3920 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1112 wrote to memory of 2996 1112 f0c20ded1d665938de180c8519a90254949af29f346cc763195ca9c41abadafa.exe 87 PID 1112 wrote to memory of 2996 1112 f0c20ded1d665938de180c8519a90254949af29f346cc763195ca9c41abadafa.exe 87 PID 1112 wrote to memory of 2996 1112 f0c20ded1d665938de180c8519a90254949af29f346cc763195ca9c41abadafa.exe 87 PID 1112 wrote to memory of 2996 1112 f0c20ded1d665938de180c8519a90254949af29f346cc763195ca9c41abadafa.exe 87 PID 1112 wrote to memory of 2996 1112 f0c20ded1d665938de180c8519a90254949af29f346cc763195ca9c41abadafa.exe 87 PID 2996 wrote to memory of 2064 2996 AppLaunch.exe 102 PID 2996 wrote to memory of 2064 2996 AppLaunch.exe 102 PID 2996 wrote to memory of 2064 2996 AppLaunch.exe 102 PID 2996 wrote to memory of 1620 2996 AppLaunch.exe 104 PID 2996 wrote to memory of 1620 2996 AppLaunch.exe 104 PID 2996 wrote to memory of 1620 2996 AppLaunch.exe 104 PID 2996 wrote to memory of 848 2996 AppLaunch.exe 106 PID 2996 wrote to memory of 848 2996 AppLaunch.exe 106 PID 2996 wrote to memory of 848 2996 AppLaunch.exe 106 PID 2996 wrote to memory of 3920 2996 AppLaunch.exe 108 PID 2996 wrote to memory of 3920 2996 AppLaunch.exe 108 PID 2996 wrote to memory of 3920 2996 AppLaunch.exe 108 PID 2996 wrote to memory of 4024 2996 AppLaunch.exe 110 PID 2996 wrote to memory of 4024 2996 AppLaunch.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0c20ded1d665938de180c8519a90254949af29f346cc763195ca9c41abadafa.exe"C:\Users\Admin\AppData\Local\Temp\f0c20ded1d665938de180c8519a90254949af29f346cc763195ca9c41abadafa.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\USOSharedssh-type8.6.4.0" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:2064
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\USOSharedssh-type8.6.4.0" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:1620
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\USOSharedssh-type8.6.4.0" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:848
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "USOSharedssh-type8.6.4.0\USOSharedssh-type8.6.4.0" /TR "C:\ProgramData\USOSharedssh-type8.6.4.0\USOSharedssh-type8.6.4.0.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:3920
-
-
C:\ProgramData\USOSharedssh-type8.6.4.0\USOSharedssh-type8.6.4.0.exe"C:\ProgramData\USOSharedssh-type8.6.4.0\USOSharedssh-type8.6.4.0.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4024
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1112 -s 2962⤵
- Program crash
PID:2572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1112 -ip 11121⤵PID:1912
-
C:\ProgramData\USOSharedssh-type8.6.4.0\USOSharedssh-type8.6.4.0.exeC:\ProgramData\USOSharedssh-type8.6.4.0\USOSharedssh-type8.6.4.0.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4464
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
804.1MB
MD53abd70f7d803665cfc5bef15d73cc400
SHA107c4b97fa5d3747740c2b8c0438287d22c49fd38
SHA25678e8888c5fc6e23a1317eec3222292c481ac7de774d6e0297a48ceaf22af7124
SHA5121637137cc144c72f50cb276a44843b45ae52f0e0bf10303d368a1fee7260c0fdc5aee8a307a66f9835da5827a5ee976b9661e05235912bcbbdd35b6240e8399a
-
Filesize
805.2MB
MD55c6c2bb14b0c651448a38675f6637b98
SHA11c7904881b59633ba8c56782cbd44fc0a9d45636
SHA256c8c5b45c1758d7f930f74e0c5c2c16136d9997054777126aea49c3fafd899d25
SHA512c353ef0c6291b437ee75c0be4aa0ed3b453bef50019528b8e22e7aff52aedd7bc31f112310d2f59dc1ec4480f1a5161629c4be21324c160610fc5fc234404e60
-
Filesize
141.7MB
MD5105325a86ec6c46a2f9e33920b2c9a53
SHA11193ce0bf7fdae8e74734dc695566d47ed95ce90
SHA256c5623db016eecfccaaaf9f3fc5c5ea50b8b6c6e97bd0662d719ece2179a69457
SHA512f90889af16d75388de81ad9e8e1d689c37fdc5eaf8f0c7be41db936296e39bac73ac87f424c9dac2e79b6eca8c0dea7d0437187e5c7f8fc0c15bdce05712f94f