Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2023, 15:40
Static task
static1
General
-
Target
180c4bb1fe34e235be1ddaac55f588886549dc53f766043f18b3d76b5a09e581.exe
-
Size
3.4MB
-
MD5
9cbb1cf4f73f842fb0aa6a9726c3c24e
-
SHA1
4f68996a486b8e68f590ff7fec88536d7f77e3e3
-
SHA256
180c4bb1fe34e235be1ddaac55f588886549dc53f766043f18b3d76b5a09e581
-
SHA512
362835c2285e2415d29a6fb3d2a7aa2e33bc7fa0ab7b80d6444f996fae915f09793cd859f705627a1cc68685a45b7698972989a130c0b620083cb063e9f2476d
-
SSDEEP
98304:eUwOIEK84WQsykAeYYkAeYUaMImg8C0Qu9MJuR21C/yIq/dhl/O4i/TksjdFwvhW:eUwOIEK84WQsykAeYYkAeYUaMImg8C0p
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ USOPrivatePackages-type8.4.7.8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ USOPrivatePackages-type8.4.7.8.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion USOPrivatePackages-type8.4.7.8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion USOPrivatePackages-type8.4.7.8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion USOPrivatePackages-type8.4.7.8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion USOPrivatePackages-type8.4.7.8.exe -
Executes dropped EXE 2 IoCs
pid Process 4296 USOPrivatePackages-type8.4.7.8.exe 2960 USOPrivatePackages-type8.4.7.8.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 3120 icacls.exe 5012 icacls.exe 548 icacls.exe -
resource yara_rule behavioral1/files/0x000400000001db45-149.dat upx behavioral1/files/0x000400000001db45-150.dat upx behavioral1/files/0x000400000001db45-151.dat upx behavioral1/memory/4296-153-0x00007FF7B5BE0000-0x00007FF7B60FF000-memory.dmp upx behavioral1/memory/4296-154-0x00007FF7B5BE0000-0x00007FF7B60FF000-memory.dmp upx behavioral1/memory/4296-155-0x00007FF7B5BE0000-0x00007FF7B60FF000-memory.dmp upx behavioral1/memory/4296-156-0x00007FF7B5BE0000-0x00007FF7B60FF000-memory.dmp upx behavioral1/files/0x000400000001db45-157.dat upx behavioral1/memory/2960-158-0x00007FF7B5BE0000-0x00007FF7B60FF000-memory.dmp upx behavioral1/memory/2960-159-0x00007FF7B5BE0000-0x00007FF7B60FF000-memory.dmp upx behavioral1/memory/2960-160-0x00007FF7B5BE0000-0x00007FF7B60FF000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA USOPrivatePackages-type8.4.7.8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA USOPrivatePackages-type8.4.7.8.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2764 set thread context of 812 2764 180c4bb1fe34e235be1ddaac55f588886549dc53f766043f18b3d76b5a09e581.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 1824 2764 WerFault.exe 84 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2268 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2764 wrote to memory of 812 2764 180c4bb1fe34e235be1ddaac55f588886549dc53f766043f18b3d76b5a09e581.exe 86 PID 2764 wrote to memory of 812 2764 180c4bb1fe34e235be1ddaac55f588886549dc53f766043f18b3d76b5a09e581.exe 86 PID 2764 wrote to memory of 812 2764 180c4bb1fe34e235be1ddaac55f588886549dc53f766043f18b3d76b5a09e581.exe 86 PID 2764 wrote to memory of 812 2764 180c4bb1fe34e235be1ddaac55f588886549dc53f766043f18b3d76b5a09e581.exe 86 PID 2764 wrote to memory of 812 2764 180c4bb1fe34e235be1ddaac55f588886549dc53f766043f18b3d76b5a09e581.exe 86 PID 812 wrote to memory of 3120 812 AppLaunch.exe 95 PID 812 wrote to memory of 3120 812 AppLaunch.exe 95 PID 812 wrote to memory of 3120 812 AppLaunch.exe 95 PID 812 wrote to memory of 5012 812 AppLaunch.exe 97 PID 812 wrote to memory of 5012 812 AppLaunch.exe 97 PID 812 wrote to memory of 5012 812 AppLaunch.exe 97 PID 812 wrote to memory of 548 812 AppLaunch.exe 99 PID 812 wrote to memory of 548 812 AppLaunch.exe 99 PID 812 wrote to memory of 548 812 AppLaunch.exe 99 PID 812 wrote to memory of 2268 812 AppLaunch.exe 101 PID 812 wrote to memory of 2268 812 AppLaunch.exe 101 PID 812 wrote to memory of 2268 812 AppLaunch.exe 101 PID 812 wrote to memory of 4296 812 AppLaunch.exe 103 PID 812 wrote to memory of 4296 812 AppLaunch.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\180c4bb1fe34e235be1ddaac55f588886549dc53f766043f18b3d76b5a09e581.exe"C:\Users\Admin\AppData\Local\Temp\180c4bb1fe34e235be1ddaac55f588886549dc53f766043f18b3d76b5a09e581.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\USOPrivatePackages-type8.4.7.8" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:3120
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\USOPrivatePackages-type8.4.7.8" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:5012
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\USOPrivatePackages-type8.4.7.8" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:548
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "USOPrivatePackages-type8.4.7.8\USOPrivatePackages-type8.4.7.8" /TR "C:\ProgramData\USOPrivatePackages-type8.4.7.8\USOPrivatePackages-type8.4.7.8.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:2268
-
-
C:\ProgramData\USOPrivatePackages-type8.4.7.8\USOPrivatePackages-type8.4.7.8.exe"C:\ProgramData\USOPrivatePackages-type8.4.7.8\USOPrivatePackages-type8.4.7.8.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4296
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 2762⤵
- Program crash
PID:1824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2764 -ip 27641⤵PID:3248
-
C:\ProgramData\USOPrivatePackages-type8.4.7.8\USOPrivatePackages-type8.4.7.8.exeC:\ProgramData\USOPrivatePackages-type8.4.7.8\USOPrivatePackages-type8.4.7.8.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2960
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
566.5MB
MD581104de6dc28eaaa5aa078d09653434f
SHA1f2a5703d8d3a6b8b8b0095354b687fea2324f1ef
SHA256a28908e129c42e2ed515eeb5758c6fb02b41f4c81f98e8b296dace448f731c3f
SHA5125eef85e355513394cc4ae9e6828d7c4e32212608035ec1bbb7bcfd2328f3b86aefaead01745478e30bcc09a53c4e332b367508b9f6a03b10cf2e91b8e65d375b
-
Filesize
620.5MB
MD5d0d45b9dc48cc58db9e996aacb25b48e
SHA12e55b5e0c023b7ebcf64f12b661dc05baa33df32
SHA25625a8e26c2e2ba1d84f324152c2f0ab0dd9a5bb6494459695a1b227585d2947c6
SHA5125d180cb8567eacb351673cde00718f8a490af0d2013bd39f4624fe5ecfc5d3bc227ca154b9ee63f2d4f5ddb29b2c53f6d619c5bfe03c83382dcb49ba60444a73
-
Filesize
610.1MB
MD5e05faed90c3d27105908bbd914216407
SHA19c0169d394402927673120fefcec7fcca2014f98
SHA256bb6f33c2d8b3f9841eb67160c3086e32b508efc4ab32f2b95400b7144e098ec5
SHA5126f401d2df9b4cc7f72968da703b6588330c22d2d63ad6642dd09493104a3a697e4e785ac8a8ef785561c4a568ef6603784a7e4661c1a2a4614e3f589362933c4
-
Filesize
343.2MB
MD530ef16908c3c7aec6e93b2d06ebbe4ef
SHA164f1d8dcdcc31ca21b9548c6b8d9ff0c2bd69584
SHA256382a9262f37268890a348cfa76efd839dbf3bb3418816f792aaefbd460cf4612
SHA51227f8e45ad99f758028a4957aa801e346435f4261564e311ee4f324941f07fd9d5acfe8ff85e277c936a3eee6e03f0fdeefdb37735a32cae30f2bf5f5d3218c11