Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 02:39
Static task
static1
General
-
Target
17e923ccb022bfb35484861031c3cf547a55b949df5e821c2edd22e64862d269.exe
-
Size
3.4MB
-
MD5
b21383166d61746164058b74fc4175a1
-
SHA1
99534e63ab00a3d97afa6bc3dbd05d0c3ce11585
-
SHA256
17e923ccb022bfb35484861031c3cf547a55b949df5e821c2edd22e64862d269
-
SHA512
383175653ad4770c1956c0e218dbffb546719bf383c590413a66436a32def85005c37c50924272afe8e375df0c16e21361ff80b3598cab433c2331dcf27e2d15
-
SSDEEP
98304:kJuR21C/yIq/dhl/O4i/TksjdFwvhzjMSwRVq:k8D/yIqlhlW4i/QsnwZzjMSeVq
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exeMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exeMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe -
Executes dropped EXE 2 IoCs
Processes:
Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exeMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exepid process 844 Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe 3344 Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe -
Modifies file permissions 1 TTPs 3 IoCs
Processes:
icacls.exeicacls.exeicacls.exepid process 2792 icacls.exe 2956 icacls.exe 1880 icacls.exe -
Processes:
resource yara_rule C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe upx C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe upx behavioral1/memory/844-152-0x00007FF7902F0000-0x00007FF79080F000-memory.dmp upx behavioral1/memory/844-153-0x00007FF7902F0000-0x00007FF79080F000-memory.dmp upx behavioral1/memory/844-154-0x00007FF7902F0000-0x00007FF79080F000-memory.dmp upx behavioral1/memory/844-155-0x00007FF7902F0000-0x00007FF79080F000-memory.dmp upx C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe upx behavioral1/memory/3344-158-0x00007FF7902F0000-0x00007FF79080F000-memory.dmp upx behavioral1/memory/3344-159-0x00007FF7902F0000-0x00007FF79080F000-memory.dmp upx behavioral1/memory/3344-160-0x00007FF7902F0000-0x00007FF79080F000-memory.dmp upx -
Processes:
Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exeMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
17e923ccb022bfb35484861031c3cf547a55b949df5e821c2edd22e64862d269.exedescription pid process target process PID 1500 set thread context of 4248 1500 17e923ccb022bfb35484861031c3cf547a55b949df5e821c2edd22e64862d269.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3360 1500 WerFault.exe 17e923ccb022bfb35484861031c3cf547a55b949df5e821c2edd22e64862d269.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
17e923ccb022bfb35484861031c3cf547a55b949df5e821c2edd22e64862d269.exeAppLaunch.exedescription pid process target process PID 1500 wrote to memory of 4248 1500 17e923ccb022bfb35484861031c3cf547a55b949df5e821c2edd22e64862d269.exe AppLaunch.exe PID 1500 wrote to memory of 4248 1500 17e923ccb022bfb35484861031c3cf547a55b949df5e821c2edd22e64862d269.exe AppLaunch.exe PID 1500 wrote to memory of 4248 1500 17e923ccb022bfb35484861031c3cf547a55b949df5e821c2edd22e64862d269.exe AppLaunch.exe PID 1500 wrote to memory of 4248 1500 17e923ccb022bfb35484861031c3cf547a55b949df5e821c2edd22e64862d269.exe AppLaunch.exe PID 1500 wrote to memory of 4248 1500 17e923ccb022bfb35484861031c3cf547a55b949df5e821c2edd22e64862d269.exe AppLaunch.exe PID 4248 wrote to memory of 2792 4248 AppLaunch.exe icacls.exe PID 4248 wrote to memory of 2792 4248 AppLaunch.exe icacls.exe PID 4248 wrote to memory of 2792 4248 AppLaunch.exe icacls.exe PID 4248 wrote to memory of 2956 4248 AppLaunch.exe icacls.exe PID 4248 wrote to memory of 2956 4248 AppLaunch.exe icacls.exe PID 4248 wrote to memory of 2956 4248 AppLaunch.exe icacls.exe PID 4248 wrote to memory of 1880 4248 AppLaunch.exe icacls.exe PID 4248 wrote to memory of 1880 4248 AppLaunch.exe icacls.exe PID 4248 wrote to memory of 1880 4248 AppLaunch.exe icacls.exe PID 4248 wrote to memory of 3476 4248 AppLaunch.exe schtasks.exe PID 4248 wrote to memory of 3476 4248 AppLaunch.exe schtasks.exe PID 4248 wrote to memory of 3476 4248 AppLaunch.exe schtasks.exe PID 4248 wrote to memory of 844 4248 AppLaunch.exe Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe PID 4248 wrote to memory of 844 4248 AppLaunch.exe Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17e923ccb022bfb35484861031c3cf547a55b949df5e821c2edd22e64862d269.exe"C:\Users\Admin\AppData\Local\Temp\17e923ccb022bfb35484861031c3cf547a55b949df5e821c2edd22e64862d269.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8" /TR "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe"C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 3122⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1500 -ip 15001⤵
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exeC:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exeFilesize
652.2MB
MD5caf0ea6fbfb63150fa9f74cc65e45bff
SHA16705958ce96d2b03a977e7e7e5443531a55e3567
SHA25697f4fcc3aae63101ec71f58811aebb905e2804cd8192b3815935349b9b392e88
SHA51249045049b507d1cb001dfc8f2501192075ae3befc1b315b3eb3f8bcd4e404d6d84fcf3429138ec3cd51cdc7261550b98beb4ea4227a4d25d217254fd785c96e5
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exeFilesize
793.0MB
MD533043124ec61089caa2c79d1b8cbf9dd
SHA1ec41b801b7d9eb84bd8f03104b7d991df7b54096
SHA256dedb08d36ad2b0ce22139d361ed1a5fefe4d47b3f3728411a4f0fd1162af7b68
SHA512e752dce4d7d72f1e3074c7b01847f16cce04c9fd184a2747758a3e57dc123df0206f4e844f9b3d723acf3df4f24d1d5f84b32c252607f25f1ed38344e0c60c2e
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exeFilesize
498.5MB
MD5e0502144c283b9766d12b29a7a421964
SHA16963355201cf6ef6ab0f26be12435cf8903a0303
SHA256b27a1013b1643f4fc6d7657e61304719dd35de35781eb0da7a65aef2b7245317
SHA512c421367fe89f36a28e4d89aca925d7d0ed42789bd27d18671dc6a5c5a0d992b81570aac72d8d4a421fe1381b46d3e6f11df0dd4dc16bfea21b952c110b215d6b
-
memory/844-154-0x00007FF7902F0000-0x00007FF79080F000-memory.dmpFilesize
5.1MB
-
memory/844-155-0x00007FF7902F0000-0x00007FF79080F000-memory.dmpFilesize
5.1MB
-
memory/844-156-0x00007FF7902F0000-0x00007FF79080F000-memory.dmpFilesize
5.1MB
-
memory/844-153-0x00007FF7902F0000-0x00007FF79080F000-memory.dmpFilesize
5.1MB
-
memory/844-152-0x00007FF7902F0000-0x00007FF79080F000-memory.dmpFilesize
5.1MB
-
memory/3344-158-0x00007FF7902F0000-0x00007FF79080F000-memory.dmpFilesize
5.1MB
-
memory/3344-159-0x00007FF7902F0000-0x00007FF79080F000-memory.dmpFilesize
5.1MB
-
memory/3344-160-0x00007FF7902F0000-0x00007FF79080F000-memory.dmpFilesize
5.1MB
-
memory/4248-140-0x0000000005440000-0x000000000544A000-memory.dmpFilesize
40KB
-
memory/4248-139-0x00000000054B0000-0x0000000005542000-memory.dmpFilesize
584KB
-
memory/4248-144-0x0000000005490000-0x00000000054A0000-memory.dmpFilesize
64KB
-
memory/4248-143-0x0000000005490000-0x00000000054A0000-memory.dmpFilesize
64KB
-
memory/4248-133-0x0000000000400000-0x000000000075C000-memory.dmpFilesize
3.4MB
-
memory/4248-141-0x0000000005490000-0x00000000054A0000-memory.dmpFilesize
64KB
-
memory/4248-142-0x0000000005490000-0x00000000054A0000-memory.dmpFilesize
64KB
-
memory/4248-138-0x0000000005A60000-0x0000000006004000-memory.dmpFilesize
5.6MB