Analysis
-
max time kernel
141s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2023 22:13
Static task
static1
General
-
Target
39d855232ce6e5a3afd70633b77ee7ff237fd719c787dc3e2e69f3f3fec48695.exe
-
Size
3.4MB
-
MD5
87cc771bc737365a5940738259947239
-
SHA1
1bde835becb4eeef7557247de5ce4bf8b4d9c095
-
SHA256
39d855232ce6e5a3afd70633b77ee7ff237fd719c787dc3e2e69f3f3fec48695
-
SHA512
c99ec59916a23a5e5e076bcb661f4168a0bbc4fa8a21c2ed1e5a272d450bfa73c5aec4bbc9a178ccd4e2b126f53f7342a90b58b26f4fb51339444aadddd920d3
-
SSDEEP
49152:5vNJEciXT1SMTEGUlayCd1XlOrUcwFY92eg6zBCYUFQumEeBAoCuYXMYo3js:ucmEZlaPfUwbYIelzBLU3vqCRs
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sshUSOPrivate-type0.0.2.5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sshUSOPrivate-type0.0.2.5.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sshUSOPrivate-type0.0.2.5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sshUSOPrivate-type0.0.2.5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sshUSOPrivate-type0.0.2.5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sshUSOPrivate-type0.0.2.5.exe -
Executes dropped EXE 2 IoCs
pid Process 4636 sshUSOPrivate-type0.0.2.5.exe 4456 sshUSOPrivate-type0.0.2.5.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 3664 icacls.exe 4720 icacls.exe 3264 icacls.exe -
resource yara_rule behavioral1/files/0x000600000002316e-149.dat upx behavioral1/files/0x000600000002316e-152.dat upx behavioral1/files/0x000600000002316e-151.dat upx behavioral1/memory/4636-154-0x00007FF736650000-0x00007FF736B6F000-memory.dmp upx behavioral1/memory/4636-155-0x00007FF736650000-0x00007FF736B6F000-memory.dmp upx behavioral1/memory/4636-156-0x00007FF736650000-0x00007FF736B6F000-memory.dmp upx behavioral1/memory/4636-157-0x00007FF736650000-0x00007FF736B6F000-memory.dmp upx behavioral1/files/0x000600000002316e-158.dat upx behavioral1/memory/4456-159-0x00007FF736650000-0x00007FF736B6F000-memory.dmp upx behavioral1/memory/4456-160-0x00007FF736650000-0x00007FF736B6F000-memory.dmp upx behavioral1/memory/4456-161-0x00007FF736650000-0x00007FF736B6F000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sshUSOPrivate-type0.0.2.5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sshUSOPrivate-type0.0.2.5.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1932 set thread context of 1192 1932 39d855232ce6e5a3afd70633b77ee7ff237fd719c787dc3e2e69f3f3fec48695.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 3320 1932 WerFault.exe 83 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4128 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1192 1932 39d855232ce6e5a3afd70633b77ee7ff237fd719c787dc3e2e69f3f3fec48695.exe 85 PID 1932 wrote to memory of 1192 1932 39d855232ce6e5a3afd70633b77ee7ff237fd719c787dc3e2e69f3f3fec48695.exe 85 PID 1932 wrote to memory of 1192 1932 39d855232ce6e5a3afd70633b77ee7ff237fd719c787dc3e2e69f3f3fec48695.exe 85 PID 1932 wrote to memory of 1192 1932 39d855232ce6e5a3afd70633b77ee7ff237fd719c787dc3e2e69f3f3fec48695.exe 85 PID 1932 wrote to memory of 1192 1932 39d855232ce6e5a3afd70633b77ee7ff237fd719c787dc3e2e69f3f3fec48695.exe 85 PID 1192 wrote to memory of 3664 1192 AppLaunch.exe 94 PID 1192 wrote to memory of 3664 1192 AppLaunch.exe 94 PID 1192 wrote to memory of 3664 1192 AppLaunch.exe 94 PID 1192 wrote to memory of 4720 1192 AppLaunch.exe 96 PID 1192 wrote to memory of 4720 1192 AppLaunch.exe 96 PID 1192 wrote to memory of 4720 1192 AppLaunch.exe 96 PID 1192 wrote to memory of 3264 1192 AppLaunch.exe 98 PID 1192 wrote to memory of 3264 1192 AppLaunch.exe 98 PID 1192 wrote to memory of 3264 1192 AppLaunch.exe 98 PID 1192 wrote to memory of 4128 1192 AppLaunch.exe 100 PID 1192 wrote to memory of 4128 1192 AppLaunch.exe 100 PID 1192 wrote to memory of 4128 1192 AppLaunch.exe 100 PID 1192 wrote to memory of 4636 1192 AppLaunch.exe 102 PID 1192 wrote to memory of 4636 1192 AppLaunch.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\39d855232ce6e5a3afd70633b77ee7ff237fd719c787dc3e2e69f3f3fec48695.exe"C:\Users\Admin\AppData\Local\Temp\39d855232ce6e5a3afd70633b77ee7ff237fd719c787dc3e2e69f3f3fec48695.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\sshUSOPrivate-type0.0.2.5" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:3664
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\sshUSOPrivate-type0.0.2.5" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4720
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\sshUSOPrivate-type0.0.2.5" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:3264
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "sshUSOPrivate-type0.0.2.5\sshUSOPrivate-type0.0.2.5" /TR "C:\ProgramData\sshUSOPrivate-type0.0.2.5\sshUSOPrivate-type0.0.2.5.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:4128
-
-
C:\ProgramData\sshUSOPrivate-type0.0.2.5\sshUSOPrivate-type0.0.2.5.exe"C:\ProgramData\sshUSOPrivate-type0.0.2.5\sshUSOPrivate-type0.0.2.5.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4636
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 1362⤵
- Program crash
PID:3320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1932 -ip 19321⤵PID:4152
-
C:\ProgramData\sshUSOPrivate-type0.0.2.5\sshUSOPrivate-type0.0.2.5.exeC:\ProgramData\sshUSOPrivate-type0.0.2.5\sshUSOPrivate-type0.0.2.5.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4456
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
560.0MB
MD5452d06d99722fbb659326b62b27faeba
SHA1f8742011dd940bf177fb4c226161fc0294f17900
SHA256b3b8883a22d1de5368fe10c5d9db7a9929def0c4de3b3c024391f7ace8c3a2e0
SHA5122f7e2b8ffb59c902cb151a4a91e536cf187e66ebd7ef9f02783eebc29896aa0aa78bcdc5051a1da05870802875b2221688a2367d02830f4c3b134f512c9f7b18
-
Filesize
559.2MB
MD59acd3949e2bc5de2bf9f69be73c64597
SHA1227471279e73a784204797016e3573680fc16e38
SHA2563bab9adbf194263db05d8a57fce213dd05d744aae5de6b9beeea3bd93b0ded38
SHA51262d7ab6675b79d60ae443fbdc87d1a2e9d495cdce6496b25be5cd3a2a4d8b50a495a6d173e79b0b79e8e09a2fd12bf1ac562da8dbcf91ab8356e219a011560a0
-
Filesize
507.2MB
MD5f7457f0b88a1eaefac8af67a4870e0f0
SHA19dcb8e0b3843bad9aaea9b125b37a1371a935087
SHA256c2cd94c0da121cf3c2bc7da3e24b445cb25e972e61492e63a19d97766c818453
SHA5127366a430f3234ff0561d99802894bad3791d926b2ea5b4589a98eeca8732e15c3144e3864a419201930afc103aae0198f5fada664709379e2aafc43f58343a4a
-
Filesize
277.2MB
MD5f9c0ff5a36dd5df2d74490435a1c71df
SHA14061f06eb02299b686fb55245587eb23d29a0f49
SHA256e6b96ad163f0ba2297f0e4b7994bca906b82befe8e248c67120e1aed9f7376fe
SHA512f7f18f396c67d64723edb78bd41dac4ad883a630cbd12dd22916ea1f66ade53431fd9c781805bf17e55b02e425da1c0a21c77b633035fa938cbd8f0593ece487