Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 05:28

General

  • Target

    36bb0deef2c5cf1217b7a181118dfd622422113672b4bd4327b2bed1bba752f6.exe

  • Size

    3.4MB

  • MD5

    9383f0739c9ec8fa2f115488b6149b00

  • SHA1

    f7de0fe9da6b48295c6233f081d3647209ab266f

  • SHA256

    36bb0deef2c5cf1217b7a181118dfd622422113672b4bd4327b2bed1bba752f6

  • SHA512

    4e84f36d05b5e8fbfcf2ee5616ee6af85fee56a8ccacce088bfbf4ef97467f8d52e027f0e8e77776443843c9ebd658e00608659d305321ca5c0350736db94a83

  • SSDEEP

    98304:7JuR21C/yIq/dhl/O4i/TksjdFwvhzjMSwRVq:78D/yIqlhlW4i/QsnwZzjMSeVq

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Modifies file permissions 1 TTPs 3 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36bb0deef2c5cf1217b7a181118dfd622422113672b4bd4327b2bed1bba752f6.exe
    "C:\Users\Admin\AppData\Local\Temp\36bb0deef2c5cf1217b7a181118dfd622422113672b4bd4327b2bed1bba752f6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3976
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\DesktopDesktop-type9.5.1.4" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:2792
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\DesktopDesktop-type9.5.1.4" /inheritance:e /deny "admin:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:3316
      • C:\Windows\SysWOW64\icacls.exe
        "C:\Windows\System32\icacls.exe" "C:\ProgramData\DesktopDesktop-type9.5.1.4" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"
        3⤵
        • Modifies file permissions
        PID:2856
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /CREATE /TN "DesktopDesktop-type9.5.1.4\DesktopDesktop-type9.5.1.4" /TR "C:\ProgramData\DesktopDesktop-type9.5.1.4\DesktopDesktop-type9.5.1.4.exe" /SC MINUTE
        3⤵
        • Creates scheduled task(s)
        PID:1580
      • C:\ProgramData\DesktopDesktop-type9.5.1.4\DesktopDesktop-type9.5.1.4.exe
        "C:\ProgramData\DesktopDesktop-type9.5.1.4\DesktopDesktop-type9.5.1.4.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        PID:3836
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 396
      2⤵
      • Program crash
      PID:428
  • C:\ProgramData\DesktopDesktop-type9.5.1.4\DesktopDesktop-type9.5.1.4.exe
    C:\ProgramData\DesktopDesktop-type9.5.1.4\DesktopDesktop-type9.5.1.4.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Checks whether UAC is enabled
    PID:1252

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

File Permissions Modification

1
T1222

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\DesktopDesktop-type9.5.1.4\DesktopDesktop-type9.5.1.4.exe
    Filesize

    697.4MB

    MD5

    422e4e35465e3c7a652a6f58a97bdf59

    SHA1

    675a84a0019a7f88ff5716b89eaa3b2151360283

    SHA256

    7c41b15ed8fc6cca19079134e61ea44daf7875f9ad54ce9b50bfdde9df2bec6f

    SHA512

    747ff7b93e635f33acbb7783c04c182e9a6a23856f7f53c23fe87a03ae2683ded8e63c8883ea0a73067885cfb8fc8b55f6c78118b3f50e056e9a2422addfed42

  • C:\ProgramData\DesktopDesktop-type9.5.1.4\DesktopDesktop-type9.5.1.4.exe
    Filesize

    697.4MB

    MD5

    422e4e35465e3c7a652a6f58a97bdf59

    SHA1

    675a84a0019a7f88ff5716b89eaa3b2151360283

    SHA256

    7c41b15ed8fc6cca19079134e61ea44daf7875f9ad54ce9b50bfdde9df2bec6f

    SHA512

    747ff7b93e635f33acbb7783c04c182e9a6a23856f7f53c23fe87a03ae2683ded8e63c8883ea0a73067885cfb8fc8b55f6c78118b3f50e056e9a2422addfed42

  • C:\ProgramData\DesktopDesktop-type9.5.1.4\DesktopDesktop-type9.5.1.4.exe
    Filesize

    555.7MB

    MD5

    cb99be6b08a97919c29ffdc9a101adeb

    SHA1

    95920b94183e1eb95c7ac8360b21e75d73819b96

    SHA256

    024806bbbdec45f99db011178019c358af685c67d64e464848245c6df6f0c3e8

    SHA512

    84c2720576ab7acb922f1368cfa6934d979f3e2d8a7b6181ad14dcd3d5b9cf9d0ea78b076ef099af14d77222807a66b19e9400753749b56991b3c6c1c75046ae

  • memory/1252-160-0x00007FF7B6D30000-0x00007FF7B724F000-memory.dmp
    Filesize

    5.1MB

  • memory/1252-159-0x00007FF7B6D30000-0x00007FF7B724F000-memory.dmp
    Filesize

    5.1MB

  • memory/1252-158-0x00007FF7B6D30000-0x00007FF7B724F000-memory.dmp
    Filesize

    5.1MB

  • memory/1252-157-0x00007FF7B6D30000-0x00007FF7B724F000-memory.dmp
    Filesize

    5.1MB

  • memory/1252-156-0x00007FF7B6D30000-0x00007FF7B724F000-memory.dmp
    Filesize

    5.1MB

  • memory/3836-153-0x00007FF7B6D30000-0x00007FF7B724F000-memory.dmp
    Filesize

    5.1MB

  • memory/3836-149-0x00007FF7B6D30000-0x00007FF7B724F000-memory.dmp
    Filesize

    5.1MB

  • memory/3836-150-0x00007FF7B6D30000-0x00007FF7B724F000-memory.dmp
    Filesize

    5.1MB

  • memory/3836-151-0x00007FF7B6D30000-0x00007FF7B724F000-memory.dmp
    Filesize

    5.1MB

  • memory/3976-120-0x0000000000400000-0x000000000075C000-memory.dmp
    Filesize

    3.4MB

  • memory/3976-132-0x00000000092A0000-0x00000000092B0000-memory.dmp
    Filesize

    64KB

  • memory/3976-131-0x00000000092A0000-0x00000000092B0000-memory.dmp
    Filesize

    64KB

  • memory/3976-130-0x00000000092A0000-0x00000000092B0000-memory.dmp
    Filesize

    64KB

  • memory/3976-129-0x0000000009250000-0x000000000925A000-memory.dmp
    Filesize

    40KB

  • memory/3976-128-0x00000000092C0000-0x0000000009352000-memory.dmp
    Filesize

    584KB

  • memory/3976-127-0x0000000009720000-0x0000000009C1E000-memory.dmp
    Filesize

    5.0MB