Analysis

  • max time kernel
    296s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    27-03-2023 22:17

General

  • Target

    e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe

  • Size

    3.4MB

  • MD5

    15720b49943d91b0fc1c85a324f8a003

  • SHA1

    29795b9b75c9684e3e06c01b91084125f4eb84d6

  • SHA256

    e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf

  • SHA512

    5ca50134799e2189f0c8d945dc22d12bac14c563a42141fbc8d6404d1d42b527bb7c643a481b8ffcd4ecea079ce6b532ab24272db9ee0c9983bf5734a725b13e

  • SSDEEP

    98304:7JuR21C/yIq/dhl/O4i/TksjdFwvhzjMSwRVq:78D/yIqlhlW4i/QsnwZzjMSeVq

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Modifies file permissions 1 TTPs 3 IoCs
  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe
    "C:\Users\Admin\AppData\Local\Temp\e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1528
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:600
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:320
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2" /inheritance:e /deny "admin:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:1684
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /CREATE /TN "Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2" /TR "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe" /SC MINUTE
        3⤵
        • Creates scheduled task(s)
        PID:1776
      • C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe
        "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        PID:832
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 36
      2⤵
      • Program crash
      PID:860
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {A629224D-1E5E-4846-B13B-7FD1A33E63DB} S-1-5-21-3430344531-3702557399-3004411149-1000:WFSTZEPN\Admin:Interactive:[1]
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe
      C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      PID:956

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

File Permissions Modification

1
T1222

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe
    Filesize

    591.3MB

    MD5

    4e4589c1b9755439518e06c0a39c6ebd

    SHA1

    6218cb8c3078db9ddefac0fb390df3aef6a97e28

    SHA256

    e9f6017f26ee8b9a179fc6e108dab9277e44349506b271d5decd5d536959298a

    SHA512

    66b33d37cee23047be8247bf0d7b35cc2e4ab57c9486fcafb5032fd00164f53420cddb94a8151820ee1c57e22cd661e04cfa768bfb7294fd455e136c2ee6e77e

  • C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe
    Filesize

    595.5MB

    MD5

    8dfb676cdd7db7b9254657fa6b68ec8b

    SHA1

    4aff01f4ae04a35aa2bd4bd38399eb876c452849

    SHA256

    13c18e4ba1353ebdc8f9c76f650dbf6a8e0e84d0ae8408e482f2874d59299958

    SHA512

    7992034e53e6bd64f4f62208ab2cc13d7fe72351018195c4e43ae352aae369c80b52af49af0d58f4787f2e2941ea4082da6354d7405868ab4a86ae74df6e0046

  • C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe
    Filesize

    582.6MB

    MD5

    ac937929feb8a272c6f91d3830a90a44

    SHA1

    8e91bcf2265029e8f6c0ce289241bbbb7492e748

    SHA256

    e570e703273e96c8511147c85eaddfd48967d76119fba02438905d4a2ae453ab

    SHA512

    c778fefd6f2cca5483d3a8cd7c7b6672025522a5bc58d3154e939fe6beaab1a9c966a89d0dc16622969249a2281b721612b49a3dcc32e233e2e40d78ad4d1072

  • C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe
    Filesize

    410.7MB

    MD5

    f9f93226262e599713a0c5b55b0f8793

    SHA1

    ba4b5d7c1620b570deb582b4b32b14fd1a2b8186

    SHA256

    14bc5d19f29a5890e3b46317ecdccb08d4a4a90568689b243271205e48c20dcb

    SHA512

    a559f7f599cd7de75f8bba15fc333c233ab2b16c6f09a89de7602ead7a505fa29107f487d3e03f680f38c4cd97690d3c2591628107f7aa399b151a04130bda4f

  • \ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe
    Filesize

    588.1MB

    MD5

    2d80da9dced6785bd360ae7cf3e4a952

    SHA1

    3ab38ad054d47c5c3fc5ce684bb1da280b4d5989

    SHA256

    5ce1b7b0fe4c29f421dfdb32c5eb1008297497ae9ae9a0f460cdb10a3237cc1f

    SHA512

    0121a1c6f6e1721e78d4cd57e819f80e24a36824b4e10564e15ff22b35273cb0b0b0667a6e75cbdd85438f87c3d2c0a3b78f00644695b46e16348310606141f0

  • \ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe
    Filesize

    574.6MB

    MD5

    0400589c803104c0dd1c98a9c40b8f26

    SHA1

    a71c2cd15c91ce40e68f1a3334966812e4470206

    SHA256

    79498c4a25296299e437488bb6212786e3ad4f2605978ef8f02707c8395e9ec6

    SHA512

    332483a74443e74d713b1bf8bc67285d654c4cef4c524da473ade583236de4176d8dc89542514286a92956ac90fea4f63e2fed1589e64c5500a03f2d8e8cbaf1

  • \ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe
    Filesize

    429.3MB

    MD5

    3856ec28c4243c5842358eaecb25d96f

    SHA1

    2fa1d922075020152fc7cbdef16e809465c33a22

    SHA256

    a860ced281d84c2374d1ddc17091f1a0ae69d0a51b670adf5bf0040cabc834d8

    SHA512

    f29fd21760986deee1d26f2de12d6d3722d827180515b20396542d79ea820cce2e7d5b0f10f97ffdcaccf1be47dc628529d14fc10c70935c7d3912f71b4f9ff6

  • \ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe
    Filesize

    408.3MB

    MD5

    1aa89f20385a1fd1645a896ed4fa844d

    SHA1

    cd94555983b710f21dec44ce1070b3f8dc40d375

    SHA256

    9075f3b2789fcaa0c17f917351c027c2469ef025f1b7200a4bd1dfce570e6d3b

    SHA512

    75150716bdcca06a564bc77fd644fbd08fb56c20a94fb46825e4c92d45e29628000c58656f563fcc8d8b16c1e9984bfe998cff5e0393ee18329d4cfa1933d768

  • memory/832-79-0x000000013F9B0000-0x000000013FECF000-memory.dmp
    Filesize

    5.1MB

  • memory/832-77-0x000000013F9B0000-0x000000013FECF000-memory.dmp
    Filesize

    5.1MB

  • memory/832-76-0x000000013F9B0000-0x000000013FECF000-memory.dmp
    Filesize

    5.1MB

  • memory/956-85-0x000000013F090000-0x000000013F5AF000-memory.dmp
    Filesize

    5.1MB

  • memory/956-84-0x000000013F090000-0x000000013F5AF000-memory.dmp
    Filesize

    5.1MB

  • memory/956-87-0x000000013F090000-0x000000013F5AF000-memory.dmp
    Filesize

    5.1MB

  • memory/956-88-0x000000013F090000-0x000000013F5AF000-memory.dmp
    Filesize

    5.1MB

  • memory/1108-86-0x000000013F090000-0x000000013F5AF000-memory.dmp
    Filesize

    5.1MB

  • memory/1528-64-0x0000000005190000-0x00000000051D0000-memory.dmp
    Filesize

    256KB

  • memory/1528-80-0x0000000008310000-0x000000000882F000-memory.dmp
    Filesize

    5.1MB

  • memory/1528-74-0x0000000008310000-0x000000000882F000-memory.dmp
    Filesize

    5.1MB

  • memory/1528-65-0x0000000005190000-0x00000000051D0000-memory.dmp
    Filesize

    256KB

  • memory/1528-54-0x0000000000400000-0x000000000075C000-memory.dmp
    Filesize

    3.4MB

  • memory/1528-63-0x0000000005190000-0x00000000051D0000-memory.dmp
    Filesize

    256KB

  • memory/1528-62-0x0000000000400000-0x000000000075C000-memory.dmp
    Filesize

    3.4MB

  • memory/1528-61-0x0000000000400000-0x000000000075C000-memory.dmp
    Filesize

    3.4MB

  • memory/1528-59-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/1528-55-0x0000000000400000-0x000000000075C000-memory.dmp
    Filesize

    3.4MB