Analysis

  • max time kernel
    145s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 02:39

General

  • Target

    17e923ccb022bfb35484861031c3cf547a55b949df5e821c2edd22e64862d269.exe

  • Size

    3.4MB

  • MD5

    b21383166d61746164058b74fc4175a1

  • SHA1

    99534e63ab00a3d97afa6bc3dbd05d0c3ce11585

  • SHA256

    17e923ccb022bfb35484861031c3cf547a55b949df5e821c2edd22e64862d269

  • SHA512

    383175653ad4770c1956c0e218dbffb546719bf383c590413a66436a32def85005c37c50924272afe8e375df0c16e21361ff80b3598cab433c2331dcf27e2d15

  • SSDEEP

    98304:kJuR21C/yIq/dhl/O4i/TksjdFwvhzjMSwRVq:k8D/yIqlhlW4i/QsnwZzjMSeVq

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Modifies file permissions 1 TTPs 3 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17e923ccb022bfb35484861031c3cf547a55b949df5e821c2edd22e64862d269.exe
    "C:\Users\Admin\AppData\Local\Temp\17e923ccb022bfb35484861031c3cf547a55b949df5e821c2edd22e64862d269.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4248
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:2792
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:2956
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8" /inheritance:e /deny "admin:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:1880
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /CREATE /TN "Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8" /TR "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe" /SC MINUTE
        3⤵
        • Creates scheduled task(s)
        PID:3476
      • C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe
        "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        PID:844
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 312
      2⤵
      • Program crash
      PID:3360
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1500 -ip 1500
    1⤵
      PID:3924
    • C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe
      C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      PID:3344

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Virtualization/Sandbox Evasion

    1
    T1497

    File Permissions Modification

    1
    T1222

    Discovery

    Query Registry

    2
    T1012

    Virtualization/Sandbox Evasion

    1
    T1497

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe
      Filesize

      652.2MB

      MD5

      caf0ea6fbfb63150fa9f74cc65e45bff

      SHA1

      6705958ce96d2b03a977e7e7e5443531a55e3567

      SHA256

      97f4fcc3aae63101ec71f58811aebb905e2804cd8192b3815935349b9b392e88

      SHA512

      49045049b507d1cb001dfc8f2501192075ae3befc1b315b3eb3f8bcd4e404d6d84fcf3429138ec3cd51cdc7261550b98beb4ea4227a4d25d217254fd785c96e5

    • C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe
      Filesize

      793.0MB

      MD5

      33043124ec61089caa2c79d1b8cbf9dd

      SHA1

      ec41b801b7d9eb84bd8f03104b7d991df7b54096

      SHA256

      dedb08d36ad2b0ce22139d361ed1a5fefe4d47b3f3728411a4f0fd1162af7b68

      SHA512

      e752dce4d7d72f1e3074c7b01847f16cce04c9fd184a2747758a3e57dc123df0206f4e844f9b3d723acf3df4f24d1d5f84b32c252607f25f1ed38344e0c60c2e

    • C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38ssh-type2.6.9.8.exe
      Filesize

      498.5MB

      MD5

      e0502144c283b9766d12b29a7a421964

      SHA1

      6963355201cf6ef6ab0f26be12435cf8903a0303

      SHA256

      b27a1013b1643f4fc6d7657e61304719dd35de35781eb0da7a65aef2b7245317

      SHA512

      c421367fe89f36a28e4d89aca925d7d0ed42789bd27d18671dc6a5c5a0d992b81570aac72d8d4a421fe1381b46d3e6f11df0dd4dc16bfea21b952c110b215d6b

    • memory/844-154-0x00007FF7902F0000-0x00007FF79080F000-memory.dmp
      Filesize

      5.1MB

    • memory/844-155-0x00007FF7902F0000-0x00007FF79080F000-memory.dmp
      Filesize

      5.1MB

    • memory/844-156-0x00007FF7902F0000-0x00007FF79080F000-memory.dmp
      Filesize

      5.1MB

    • memory/844-153-0x00007FF7902F0000-0x00007FF79080F000-memory.dmp
      Filesize

      5.1MB

    • memory/844-152-0x00007FF7902F0000-0x00007FF79080F000-memory.dmp
      Filesize

      5.1MB

    • memory/3344-158-0x00007FF7902F0000-0x00007FF79080F000-memory.dmp
      Filesize

      5.1MB

    • memory/3344-159-0x00007FF7902F0000-0x00007FF79080F000-memory.dmp
      Filesize

      5.1MB

    • memory/3344-160-0x00007FF7902F0000-0x00007FF79080F000-memory.dmp
      Filesize

      5.1MB

    • memory/4248-140-0x0000000005440000-0x000000000544A000-memory.dmp
      Filesize

      40KB

    • memory/4248-139-0x00000000054B0000-0x0000000005542000-memory.dmp
      Filesize

      584KB

    • memory/4248-144-0x0000000005490000-0x00000000054A0000-memory.dmp
      Filesize

      64KB

    • memory/4248-143-0x0000000005490000-0x00000000054A0000-memory.dmp
      Filesize

      64KB

    • memory/4248-133-0x0000000000400000-0x000000000075C000-memory.dmp
      Filesize

      3.4MB

    • memory/4248-141-0x0000000005490000-0x00000000054A0000-memory.dmp
      Filesize

      64KB

    • memory/4248-142-0x0000000005490000-0x00000000054A0000-memory.dmp
      Filesize

      64KB

    • memory/4248-138-0x0000000005A60000-0x0000000006004000-memory.dmp
      Filesize

      5.6MB