Analysis
-
max time kernel
142s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 19:02
Static task
static1
General
-
Target
b578bfb0a7aacb8ccf161359d0c13c8eb71767940756c8e834359f57465972b6.exe
-
Size
3.4MB
-
MD5
23f11a7d3c4598a480da9dffa64c07d7
-
SHA1
49c861957c9d335afa9775195f8eea0242c6039b
-
SHA256
b578bfb0a7aacb8ccf161359d0c13c8eb71767940756c8e834359f57465972b6
-
SHA512
e8f765e74e71d72a7b7b26dbf4b105556df5deab62caa0e7c621c0353ffe1e75ba4fb5bea5a1ef8c29a4dd5c9d48a86847f3178390b44ff9c2d98768e2c52eb1
-
SSDEEP
98304:BJuR21C/yIq/dhl/O4i/TksjdFwvhzjMSwRVq:B8D/yIqlhlW4i/QsnwZzjMSeVq
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DesktopMicrosoft-type4.9.6.4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DesktopMicrosoft-type4.9.6.4.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DesktopMicrosoft-type4.9.6.4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DesktopMicrosoft-type4.9.6.4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DesktopMicrosoft-type4.9.6.4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DesktopMicrosoft-type4.9.6.4.exe -
Executes dropped EXE 2 IoCs
pid Process 5028 DesktopMicrosoft-type4.9.6.4.exe 3324 DesktopMicrosoft-type4.9.6.4.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 1936 icacls.exe 4892 icacls.exe 1144 icacls.exe -
resource yara_rule behavioral1/files/0x00010000000230ed-149.dat upx behavioral1/files/0x00010000000230ed-150.dat upx behavioral1/memory/5028-152-0x00007FF662930000-0x00007FF662E4F000-memory.dmp upx behavioral1/memory/5028-153-0x00007FF662930000-0x00007FF662E4F000-memory.dmp upx behavioral1/memory/5028-154-0x00007FF662930000-0x00007FF662E4F000-memory.dmp upx behavioral1/memory/5028-155-0x00007FF662930000-0x00007FF662E4F000-memory.dmp upx behavioral1/memory/5028-156-0x00007FF662930000-0x00007FF662E4F000-memory.dmp upx behavioral1/memory/5028-157-0x00007FF662930000-0x00007FF662E4F000-memory.dmp upx behavioral1/files/0x00010000000230ed-158.dat upx behavioral1/memory/3324-159-0x00007FF662930000-0x00007FF662E4F000-memory.dmp upx behavioral1/memory/3324-160-0x00007FF662930000-0x00007FF662E4F000-memory.dmp upx behavioral1/memory/3324-161-0x00007FF662930000-0x00007FF662E4F000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DesktopMicrosoft-type4.9.6.4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DesktopMicrosoft-type4.9.6.4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 452 set thread context of 1508 452 b578bfb0a7aacb8ccf161359d0c13c8eb71767940756c8e834359f57465972b6.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 2188 452 WerFault.exe 82 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5076 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 452 wrote to memory of 1508 452 b578bfb0a7aacb8ccf161359d0c13c8eb71767940756c8e834359f57465972b6.exe 84 PID 452 wrote to memory of 1508 452 b578bfb0a7aacb8ccf161359d0c13c8eb71767940756c8e834359f57465972b6.exe 84 PID 452 wrote to memory of 1508 452 b578bfb0a7aacb8ccf161359d0c13c8eb71767940756c8e834359f57465972b6.exe 84 PID 452 wrote to memory of 1508 452 b578bfb0a7aacb8ccf161359d0c13c8eb71767940756c8e834359f57465972b6.exe 84 PID 452 wrote to memory of 1508 452 b578bfb0a7aacb8ccf161359d0c13c8eb71767940756c8e834359f57465972b6.exe 84 PID 1508 wrote to memory of 1936 1508 AppLaunch.exe 94 PID 1508 wrote to memory of 1936 1508 AppLaunch.exe 94 PID 1508 wrote to memory of 1936 1508 AppLaunch.exe 94 PID 1508 wrote to memory of 4892 1508 AppLaunch.exe 95 PID 1508 wrote to memory of 4892 1508 AppLaunch.exe 95 PID 1508 wrote to memory of 4892 1508 AppLaunch.exe 95 PID 1508 wrote to memory of 1144 1508 AppLaunch.exe 97 PID 1508 wrote to memory of 1144 1508 AppLaunch.exe 97 PID 1508 wrote to memory of 1144 1508 AppLaunch.exe 97 PID 1508 wrote to memory of 5076 1508 AppLaunch.exe 100 PID 1508 wrote to memory of 5076 1508 AppLaunch.exe 100 PID 1508 wrote to memory of 5076 1508 AppLaunch.exe 100 PID 1508 wrote to memory of 5028 1508 AppLaunch.exe 102 PID 1508 wrote to memory of 5028 1508 AppLaunch.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\b578bfb0a7aacb8ccf161359d0c13c8eb71767940756c8e834359f57465972b6.exe"C:\Users\Admin\AppData\Local\Temp\b578bfb0a7aacb8ccf161359d0c13c8eb71767940756c8e834359f57465972b6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\DesktopMicrosoft-type4.9.6.4" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:1936
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\DesktopMicrosoft-type4.9.6.4" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4892
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\DesktopMicrosoft-type4.9.6.4" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:1144
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "DesktopMicrosoft-type4.9.6.4\DesktopMicrosoft-type4.9.6.4" /TR "C:\ProgramData\DesktopMicrosoft-type4.9.6.4\DesktopMicrosoft-type4.9.6.4.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:5076
-
-
C:\ProgramData\DesktopMicrosoft-type4.9.6.4\DesktopMicrosoft-type4.9.6.4.exe"C:\ProgramData\DesktopMicrosoft-type4.9.6.4\DesktopMicrosoft-type4.9.6.4.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:5028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 452 -s 3122⤵
- Program crash
PID:2188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 452 -ip 4521⤵PID:1736
-
C:\ProgramData\DesktopMicrosoft-type4.9.6.4\DesktopMicrosoft-type4.9.6.4.exeC:\ProgramData\DesktopMicrosoft-type4.9.6.4\DesktopMicrosoft-type4.9.6.4.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
670.4MB
MD58424fec36606bc13dfef11177c68f845
SHA16168a0bbfecb1395d7fc4ccc758135d4f7fd9196
SHA25681e0b3783a9cacb2603da180243ffcf7375c52e35fcfec315a32905bc2bc88b3
SHA5120c8856606bdecf14b8e5cccc0eebbe81e7f97086a8f144e1786c101caa2c441f8f9bf1af62aef50eef3b1b58ddc38a2416b8d576b6c91ec1ccd0c0638af7dc5f
-
Filesize
575.0MB
MD5e80bd2647d6249d853c74aaae8bb944c
SHA1a717c6feffb194ce01a0bb5d50d4d69876c1a400
SHA256aac0131bf265801e2c1dc95a65bac8f2001b6ae2f4c95180ad1233ff0404c84e
SHA512854cdeca621782f6849d47d6d46790746ac52f39504c3f08e1f8ad4474ca78243c06a8fbc81d38f6060a8c97d09f1606d01a4ec363218c66eb57e6d0e8877b0c
-
Filesize
331.1MB
MD56808112b12171746e439bf85388f74a0
SHA197b20ea653f87c3fa11cbc9b37c51b11a48e5d62
SHA256784580cbaf726d001d691348c39d5eb2bd11f13b2cfbd6c3de40543f831606f6
SHA5122c45ae48e7321776552c4145ae53607ad56ce1dc02d0dcf1462abb3665a57a023873463be7fc712cd61c585066d392eb8b283753cf8480ccabd3c8a3880dd272