Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 02:55
Static task
static1
General
-
Target
ad9d35e287924a270d35465910be280dddba17a1415d416e89d6b49005078857.exe
-
Size
3.4MB
-
MD5
c197214dfd6cd7194ba5302b1f76c604
-
SHA1
82bb39e4e8c3c505c32ece9b73e02dd25c8bc2f2
-
SHA256
ad9d35e287924a270d35465910be280dddba17a1415d416e89d6b49005078857
-
SHA512
1b4f6bef7c59e06797068645083ebb267d880fc0d0267fa1366de952732b2cb64e2e0f5edbae2d83156908cc749ed6e1619e9fb5502786513e3e02cd3ebcf1d9
-
SSDEEP
98304:yJuR21C/yIq/dhl/O4i/TksjdFwvhzjMSwRV6:y8D/yIqlhlW4i/QsnwZzjMSeV6
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exeUSOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exeUSOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exe -
Executes dropped EXE 2 IoCs
Processes:
USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exeUSOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exepid process 4888 USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exe 1136 USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exe -
Modifies file permissions 1 TTPs 3 IoCs
Processes:
icacls.exeicacls.exeicacls.exepid process 2756 icacls.exe 3616 icacls.exe 2628 icacls.exe -
Processes:
resource yara_rule C:\ProgramData\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exe upx C:\ProgramData\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exe upx C:\ProgramData\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exe upx behavioral1/memory/4888-155-0x00007FF647010000-0x00007FF64752F000-memory.dmp upx behavioral1/memory/4888-156-0x00007FF647010000-0x00007FF64752F000-memory.dmp upx behavioral1/memory/4888-157-0x00007FF647010000-0x00007FF64752F000-memory.dmp upx C:\ProgramData\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exe upx behavioral1/memory/1136-160-0x00007FF647010000-0x00007FF64752F000-memory.dmp upx behavioral1/memory/1136-159-0x00007FF647010000-0x00007FF64752F000-memory.dmp upx behavioral1/memory/1136-161-0x00007FF647010000-0x00007FF64752F000-memory.dmp upx -
Processes:
USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exeUSOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ad9d35e287924a270d35465910be280dddba17a1415d416e89d6b49005078857.exedescription pid process target process PID 3560 set thread context of 2160 3560 ad9d35e287924a270d35465910be280dddba17a1415d416e89d6b49005078857.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2556 3560 WerFault.exe ad9d35e287924a270d35465910be280dddba17a1415d416e89d6b49005078857.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
ad9d35e287924a270d35465910be280dddba17a1415d416e89d6b49005078857.exeAppLaunch.exedescription pid process target process PID 3560 wrote to memory of 2160 3560 ad9d35e287924a270d35465910be280dddba17a1415d416e89d6b49005078857.exe AppLaunch.exe PID 3560 wrote to memory of 2160 3560 ad9d35e287924a270d35465910be280dddba17a1415d416e89d6b49005078857.exe AppLaunch.exe PID 3560 wrote to memory of 2160 3560 ad9d35e287924a270d35465910be280dddba17a1415d416e89d6b49005078857.exe AppLaunch.exe PID 3560 wrote to memory of 2160 3560 ad9d35e287924a270d35465910be280dddba17a1415d416e89d6b49005078857.exe AppLaunch.exe PID 3560 wrote to memory of 2160 3560 ad9d35e287924a270d35465910be280dddba17a1415d416e89d6b49005078857.exe AppLaunch.exe PID 2160 wrote to memory of 2756 2160 AppLaunch.exe icacls.exe PID 2160 wrote to memory of 2756 2160 AppLaunch.exe icacls.exe PID 2160 wrote to memory of 2756 2160 AppLaunch.exe icacls.exe PID 2160 wrote to memory of 3616 2160 AppLaunch.exe icacls.exe PID 2160 wrote to memory of 3616 2160 AppLaunch.exe icacls.exe PID 2160 wrote to memory of 3616 2160 AppLaunch.exe icacls.exe PID 2160 wrote to memory of 2628 2160 AppLaunch.exe icacls.exe PID 2160 wrote to memory of 2628 2160 AppLaunch.exe icacls.exe PID 2160 wrote to memory of 2628 2160 AppLaunch.exe icacls.exe PID 2160 wrote to memory of 684 2160 AppLaunch.exe schtasks.exe PID 2160 wrote to memory of 684 2160 AppLaunch.exe schtasks.exe PID 2160 wrote to memory of 684 2160 AppLaunch.exe schtasks.exe PID 2160 wrote to memory of 4888 2160 AppLaunch.exe USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exe PID 2160 wrote to memory of 4888 2160 AppLaunch.exe USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad9d35e287924a270d35465910be280dddba17a1415d416e89d6b49005078857.exe"C:\Users\Admin\AppData\Local\Temp\ad9d35e287924a270d35465910be280dddba17a1415d416e89d6b49005078857.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2" /TR "C:\ProgramData\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
-
C:\ProgramData\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exe"C:\ProgramData\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 3082⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3560 -ip 35601⤵
-
C:\ProgramData\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exeC:\ProgramData\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exeFilesize
613.1MB
MD5662f3ba433f93d9d30cb0af9479c4d70
SHA14db1eeac27a6d335acd796cd73254c1474358304
SHA256adf0070e7ea68a1c065957318b0d478d033cac45d5031994f5debddc9bd92236
SHA5122278af5323a6b2ba94e8947ed24eda3a44af6236ee6e909d51b801db188f7ec32f791f53f4185269e14eb6458d5cadb335331e0da53c475e64ca63c1a8109920
-
C:\ProgramData\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exeFilesize
567.4MB
MD5c79df88df4d10702c0c6b88c87217eb2
SHA1d05a35ebbf6348931637232cc4892053748e98bc
SHA256d11f3e4befbd1b6ef1ec4ca2cbf8e7a2a0c38a53172ebb3e9204fe169de14157
SHA512255a2250da27393da72df24add34e3abdd8049416a3e2663dcba7fda054a04cc5cc17c594944bfe5c44a043324bcfa398c3109a89c73d81f7b956f83080bcf4b
-
C:\ProgramData\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exeFilesize
587.1MB
MD5bff29c422fa60c518dd439876383e068
SHA1cc25810fa82f2bfbd29346b572ea4d4d78b023a0
SHA25689706fd7e0a9afca5e631520af3c88b3ac53679c9d64fde92b6b9afadb2ba5d0
SHA5121da5481fc5838a20f1143aa4300c556df38388bf4bc4fe2c2f2377846a507ae835f9aa76dd81f9afc07b3f3aed2966981d6890ea2c5fdccbe23555341368b3b6
-
C:\ProgramData\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-type8.3.0.2.exeFilesize
314.4MB
MD51d320aace97d7c6c6fea0e94033264c2
SHA1a2aa96e5fa69ee8b93debd41d77f1ea38719ce02
SHA256ba0d166c66eb5c80d4d9a5a8e5e1d5debbbda1701ef4e7e2a77638ca0fedf191
SHA51235721a98966cacccedcc6f8dc844a54acaad53081d4b430b026c064c89b2d51ed31fa4fe3d0cfd445f8b5d0e366b87501a7fe5f5eaf5a12e2857a85acc676bae
-
memory/1136-161-0x00007FF647010000-0x00007FF64752F000-memory.dmpFilesize
5.1MB
-
memory/1136-159-0x00007FF647010000-0x00007FF64752F000-memory.dmpFilesize
5.1MB
-
memory/1136-160-0x00007FF647010000-0x00007FF64752F000-memory.dmpFilesize
5.1MB
-
memory/2160-141-0x00000000050A0000-0x00000000050B0000-memory.dmpFilesize
64KB
-
memory/2160-144-0x00000000050A0000-0x00000000050B0000-memory.dmpFilesize
64KB
-
memory/2160-143-0x00000000050A0000-0x00000000050B0000-memory.dmpFilesize
64KB
-
memory/2160-142-0x00000000050A0000-0x00000000050B0000-memory.dmpFilesize
64KB
-
memory/2160-133-0x0000000000600000-0x000000000095C000-memory.dmpFilesize
3.4MB
-
memory/2160-140-0x0000000004D50000-0x0000000004D5A000-memory.dmpFilesize
40KB
-
memory/2160-139-0x0000000004E10000-0x0000000004EA2000-memory.dmpFilesize
584KB
-
memory/2160-138-0x0000000005320000-0x00000000058C4000-memory.dmpFilesize
5.6MB
-
memory/4888-155-0x00007FF647010000-0x00007FF64752F000-memory.dmpFilesize
5.1MB
-
memory/4888-156-0x00007FF647010000-0x00007FF64752F000-memory.dmpFilesize
5.1MB
-
memory/4888-157-0x00007FF647010000-0x00007FF64752F000-memory.dmpFilesize
5.1MB