Analysis
-
max time kernel
55s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2023 14:38
Behavioral task
behavioral1
Sample
ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe
Resource
win10v2004-20230220-en
General
-
Target
ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe
-
Size
3.4MB
-
MD5
588cd06833601b361f843c87056fd5a9
-
SHA1
36fd19550588e46b7ae12639421e9768f6172f0a
-
SHA256
ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1
-
SHA512
74ca11d07f98dcbae852fb94fd3fa5fb641a73917c6e85b1e2e0f49c5e8f604a14ea3deaf146ce23d4814f3daf2082d3c90d72d2759507d51cf45284f50fc979
-
SSDEEP
98304:cPMHpHh81TVkOjPdBx425wr7MARYza/PnrHT86b4GGsVJxz:cUrkTiOjPn76hCa/PrHlrVJxz
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe -
Processes:
resource yara_rule behavioral2/memory/4436-133-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-134-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-135-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-136-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-137-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-138-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-139-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-140-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-141-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-142-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-143-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-149-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-150-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-151-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-152-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-153-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-154-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-155-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-156-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-157-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-158-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida behavioral2/memory/4436-159-0x0000000000BC0000-0x00000000013A5000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows\CurrentVersion\Run ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JYEVXV = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windata\\Microsoft.exe\"" ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe -
Processes:
ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe -
AutoIT Executable 20 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4436-135-0x0000000000BC0000-0x00000000013A5000-memory.dmp autoit_exe behavioral2/memory/4436-136-0x0000000000BC0000-0x00000000013A5000-memory.dmp autoit_exe behavioral2/memory/4436-137-0x0000000000BC0000-0x00000000013A5000-memory.dmp autoit_exe behavioral2/memory/4436-138-0x0000000000BC0000-0x00000000013A5000-memory.dmp autoit_exe behavioral2/memory/4436-139-0x0000000000BC0000-0x00000000013A5000-memory.dmp autoit_exe behavioral2/memory/4436-140-0x0000000000BC0000-0x00000000013A5000-memory.dmp autoit_exe behavioral2/memory/4436-141-0x0000000000BC0000-0x00000000013A5000-memory.dmp autoit_exe behavioral2/memory/4436-142-0x0000000000BC0000-0x00000000013A5000-memory.dmp autoit_exe behavioral2/memory/4436-143-0x0000000000BC0000-0x00000000013A5000-memory.dmp autoit_exe behavioral2/memory/4436-149-0x0000000000BC0000-0x00000000013A5000-memory.dmp autoit_exe behavioral2/memory/4436-150-0x0000000000BC0000-0x00000000013A5000-memory.dmp autoit_exe behavioral2/memory/4436-151-0x0000000000BC0000-0x00000000013A5000-memory.dmp autoit_exe behavioral2/memory/4436-152-0x0000000000BC0000-0x00000000013A5000-memory.dmp autoit_exe behavioral2/memory/4436-153-0x0000000000BC0000-0x00000000013A5000-memory.dmp autoit_exe behavioral2/memory/4436-154-0x0000000000BC0000-0x00000000013A5000-memory.dmp autoit_exe behavioral2/memory/4436-155-0x0000000000BC0000-0x00000000013A5000-memory.dmp autoit_exe behavioral2/memory/4436-156-0x0000000000BC0000-0x00000000013A5000-memory.dmp autoit_exe behavioral2/memory/4436-157-0x0000000000BC0000-0x00000000013A5000-memory.dmp autoit_exe behavioral2/memory/4436-158-0x0000000000BC0000-0x00000000013A5000-memory.dmp autoit_exe behavioral2/memory/4436-159-0x0000000000BC0000-0x00000000013A5000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exepid process 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 1 IoCs
Processes:
ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\root\SecurityCenter2 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exepid process 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exepid process 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exedescription pid process target process PID 4436 wrote to memory of 1396 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe WSCript.exe PID 4436 wrote to memory of 1396 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe WSCript.exe PID 4436 wrote to memory of 1396 4436 ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe WSCript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe"C:\Users\Admin\AppData\Local\Temp\ccfd30e42f2dbb38fa3ad9528c74c6ecf6cc45ab167838200331ecf903230db1.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WSCript.exeWSCript C:\Users\Admin\AppData\Local\Temp\JYEVXV.vbs2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\JYEVXV.vbsFilesize
948B
MD5e377d9b5b2474a563460a88b5413459f
SHA1663a481a328d5b98ad8d4c020414843c5d58151a
SHA2560a13ce71c73f3f7e9d1ac4b4a55e233dbe5c0fd0c4b56abf9035e668c9f68fcb
SHA512c1074e33c0e9554ae4a3e2c0c7dbc6f15de4528e9caeff9c6841728afcd33cb8f30ba6978cd2fb76f070fd35362023a08acaa14b2f1f44defda254e1e057f47b
-
memory/4436-143-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-136-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-149-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-137-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-138-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-139-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-140-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-141-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-150-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-133-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-159-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-135-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-142-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-151-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-152-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-153-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-154-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-155-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-156-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-157-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-158-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB
-
memory/4436-134-0x0000000000BC0000-0x00000000013A5000-memory.dmpFilesize
7.9MB