Analysis
-
max time kernel
142s -
max time network
83s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27/03/2023, 01:01
Static task
static1
General
-
Target
29789b76036401899f2207526ca5fb29ae1bcb4b22d8c0da37deba8af67fb836.exe
-
Size
3.4MB
-
MD5
f38ac57b6cf644a68b88617241f62dce
-
SHA1
686b0ad66446af1351ab885d0b8216018536316f
-
SHA256
29789b76036401899f2207526ca5fb29ae1bcb4b22d8c0da37deba8af67fb836
-
SHA512
41f71133a2bfb7e808dbe34fd0e47e1c3b2baff71c73f27e3c31f436b05d993ad4956b7613326f8148a4827f47ad2b39c6abae48e63cda08c871530ee36dfc86
-
SSDEEP
49152:ZvNJEciXT1SMTEGUlayCd1XlOrUcwFY92eg6zBCYUFQumEeBAoCuYXMYo3js:OcmEZlaPfUwbYIelzBLU3vqCRs
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TemplatesWindowsHolographicDevices-type5.3.1.9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TemplatesWindowsHolographicDevices-type5.3.1.9.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TemplatesWindowsHolographicDevices-type5.3.1.9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TemplatesWindowsHolographicDevices-type5.3.1.9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TemplatesWindowsHolographicDevices-type5.3.1.9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TemplatesWindowsHolographicDevices-type5.3.1.9.exe -
Executes dropped EXE 2 IoCs
pid Process 3544 TemplatesWindowsHolographicDevices-type5.3.1.9.exe 4740 TemplatesWindowsHolographicDevices-type5.3.1.9.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 948 icacls.exe 1248 icacls.exe 1472 icacls.exe -
resource yara_rule behavioral1/files/0x000600000001aecc-145.dat upx behavioral1/files/0x000600000001aecc-146.dat upx behavioral1/memory/3544-149-0x00007FF7626E0000-0x00007FF762BFF000-memory.dmp upx behavioral1/memory/3544-150-0x00007FF7626E0000-0x00007FF762BFF000-memory.dmp upx behavioral1/memory/3544-151-0x00007FF7626E0000-0x00007FF762BFF000-memory.dmp upx behavioral1/memory/3544-152-0x00007FF7626E0000-0x00007FF762BFF000-memory.dmp upx behavioral1/memory/3544-153-0x00007FF7626E0000-0x00007FF762BFF000-memory.dmp upx behavioral1/memory/3544-154-0x00007FF7626E0000-0x00007FF762BFF000-memory.dmp upx behavioral1/files/0x000600000001aecc-155.dat upx behavioral1/memory/4740-156-0x00007FF7626E0000-0x00007FF762BFF000-memory.dmp upx behavioral1/memory/4740-157-0x00007FF7626E0000-0x00007FF762BFF000-memory.dmp upx behavioral1/memory/4740-158-0x00007FF7626E0000-0x00007FF762BFF000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TemplatesWindowsHolographicDevices-type5.3.1.9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TemplatesWindowsHolographicDevices-type5.3.1.9.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 372 set thread context of 4908 372 29789b76036401899f2207526ca5fb29ae1bcb4b22d8c0da37deba8af67fb836.exe 67 -
Program crash 1 IoCs
pid pid_target Process procid_target 440 372 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4668 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 372 wrote to memory of 4908 372 29789b76036401899f2207526ca5fb29ae1bcb4b22d8c0da37deba8af67fb836.exe 67 PID 372 wrote to memory of 4908 372 29789b76036401899f2207526ca5fb29ae1bcb4b22d8c0da37deba8af67fb836.exe 67 PID 372 wrote to memory of 4908 372 29789b76036401899f2207526ca5fb29ae1bcb4b22d8c0da37deba8af67fb836.exe 67 PID 372 wrote to memory of 4908 372 29789b76036401899f2207526ca5fb29ae1bcb4b22d8c0da37deba8af67fb836.exe 67 PID 372 wrote to memory of 4908 372 29789b76036401899f2207526ca5fb29ae1bcb4b22d8c0da37deba8af67fb836.exe 67 PID 4908 wrote to memory of 948 4908 AppLaunch.exe 70 PID 4908 wrote to memory of 948 4908 AppLaunch.exe 70 PID 4908 wrote to memory of 948 4908 AppLaunch.exe 70 PID 4908 wrote to memory of 1248 4908 AppLaunch.exe 71 PID 4908 wrote to memory of 1248 4908 AppLaunch.exe 71 PID 4908 wrote to memory of 1248 4908 AppLaunch.exe 71 PID 4908 wrote to memory of 1472 4908 AppLaunch.exe 73 PID 4908 wrote to memory of 1472 4908 AppLaunch.exe 73 PID 4908 wrote to memory of 1472 4908 AppLaunch.exe 73 PID 4908 wrote to memory of 4668 4908 AppLaunch.exe 76 PID 4908 wrote to memory of 4668 4908 AppLaunch.exe 76 PID 4908 wrote to memory of 4668 4908 AppLaunch.exe 76 PID 4908 wrote to memory of 3544 4908 AppLaunch.exe 78 PID 4908 wrote to memory of 3544 4908 AppLaunch.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\29789b76036401899f2207526ca5fb29ae1bcb4b22d8c0da37deba8af67fb836.exe"C:\Users\Admin\AppData\Local\Temp\29789b76036401899f2207526ca5fb29ae1bcb4b22d8c0da37deba8af67fb836.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\TemplatesWindowsHolographicDevices-type5.3.1.9" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:948
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\TemplatesWindowsHolographicDevices-type5.3.1.9" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:1248
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\TemplatesWindowsHolographicDevices-type5.3.1.9" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:1472
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "TemplatesWindowsHolographicDevices-type5.3.1.9\TemplatesWindowsHolographicDevices-type5.3.1.9" /TR "C:\ProgramData\TemplatesWindowsHolographicDevices-type5.3.1.9\TemplatesWindowsHolographicDevices-type5.3.1.9.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:4668
-
-
C:\ProgramData\TemplatesWindowsHolographicDevices-type5.3.1.9\TemplatesWindowsHolographicDevices-type5.3.1.9.exe"C:\ProgramData\TemplatesWindowsHolographicDevices-type5.3.1.9\TemplatesWindowsHolographicDevices-type5.3.1.9.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3544
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 5082⤵
- Program crash
PID:440
-
-
C:\ProgramData\TemplatesWindowsHolographicDevices-type5.3.1.9\TemplatesWindowsHolographicDevices-type5.3.1.9.exeC:\ProgramData\TemplatesWindowsHolographicDevices-type5.3.1.9\TemplatesWindowsHolographicDevices-type5.3.1.9.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4740
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\TemplatesWindowsHolographicDevices-type5.3.1.9\TemplatesWindowsHolographicDevices-type5.3.1.9.exe
Filesize695.9MB
MD57ba8a835b4271255deae9fcb1f84a82c
SHA17f40600a09efb157bf29816b3a92d2726b28ab62
SHA2561b52a7809f5d712bb1d77a8d0cb9786fa64a3379c909630ee9cff7d3cf9458a3
SHA51247adf2fc7ba9ed9c09c142a5feb2b2ae491b634577b98e3ea87824fa50a8949222d3f7425e61337e82024981c57ae319c77d527516936c4671f6e7a9330defa2
-
C:\ProgramData\TemplatesWindowsHolographicDevices-type5.3.1.9\TemplatesWindowsHolographicDevices-type5.3.1.9.exe
Filesize725.5MB
MD50ef814376b6a52c678099807d5005aae
SHA17e0dc2373433302b867b24f44a5902a129dc6df2
SHA256e2dad435045d2b7f5da5440211bd40701c472d25267e44e03d03bb120ac42136
SHA5122c6de8c0aee85fef4b4643f24701e4481006999cceda55857bf29b906fecade042f10e7c9b5f79fe5bf1a67e7c74938b71533112913198ec95cb082ef1b54269
-
C:\ProgramData\TemplatesWindowsHolographicDevices-type5.3.1.9\TemplatesWindowsHolographicDevices-type5.3.1.9.exe
Filesize375.9MB
MD5dbd7079738322de3b95893012451b65d
SHA18421188687f52711c2f8aa41efe0734c2074c87c
SHA2567f8c40fba123b811b08cc7505a0d68d1f433073ad53715db8a391a314dd92f6b
SHA512819b1df0f57588debf5eec636c57139c12cfe52787261fa6c6bba599e7b1ec84a64618c7c29f8c52ac9c4175565fcb91b1d587f1e82801214c166be1b2f8c624