Resubmissions

30-03-2023 14:45

230330-r44jnaee6w 8

30-03-2023 14:15

230330-rkqhpaed71 9

Analysis

  • max time kernel
    99s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-03-2023 14:15

General

  • Target

    https://anonfiles.com/0exaRah3ze/Loader_exe

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Themida packer 11 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://anonfiles.com/0exaRah3ze/Loader_exe
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4660
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4660 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4440
    • C:\Users\Admin\Downloads\Loader.exe
      "C:\Users\Admin\Downloads\Loader.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Looks for VirtualBox Guest Additions in registry
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4540
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\Downloads\Loader.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4932
        • C:\Windows\system32\certutil.exe
          certutil -hashfile "C:\Users\Admin\Downloads\Loader.exe" MD5
          4⤵
            PID:4068
          • C:\Windows\system32\find.exe
            find /i /v "md5"
            4⤵
              PID:4680
            • C:\Windows\system32\find.exe
              find /i /v "certutil"
              4⤵
                PID:4796
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c cls
              3⤵
                PID:920

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Defense Evasion

          Virtualization/Sandbox Evasion

          2
          T1497

          Modify Registry

          2
          T1112

          Discovery

          Query Registry

          4
          T1012

          Virtualization/Sandbox Evasion

          2
          T1497

          System Information Discovery

          3
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
            Filesize

            471B

            MD5

            1f2ac3b9ce5b74841f45b205ee0d6303

            SHA1

            8296c76ab6df2f4b337828efa21aaf7589f279e6

            SHA256

            54847f8ad2f6c38686e5e70f4f328478d4335aecc5cef68e653873ba4213bef3

            SHA512

            bf93d24560fb33101ac6b69ae27d5831e9535e06f10e4dc049ec02140fbc8b3f74c8b9a3a6d543fe11c42f0f5d3eb0eacffe7f606508be87379af85592fb7c84

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
            Filesize

            434B

            MD5

            63bc080766b69af0e9e4bbf23eaa55cb

            SHA1

            92d7e817f5d8c85fd1caec1208d914940be89f7c

            SHA256

            0d2a85815f3e94d2f1a8289bc2d2b89c401ade258e7296890ccff209da92ad47

            SHA512

            fbfe2e91f6b60d3070938e834d8f8d4b31da610b55be775c7ad5bac3e2ce638739f18354dabf94310026b4d0ea977370fb787ee4101bc813f847e3e1b97c96c0

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dcpq11e\imagestore.dat
            Filesize

            1KB

            MD5

            8a443163f0e01117e2df442f2e4170e5

            SHA1

            b5c82e712c94801e2ef5f34a05ce0231c1bdcd80

            SHA256

            004205ffb20d4a276f65d7d8af92f24557d14424a9684a40f150c0fca380415a

            SHA512

            995d5a9d96ec27c6b17baa2d784d50347094c04a7b051ccfbd913ccad1aee5351093f919f50b94c3fd889cc803d5446e83f0f7b05c691cbdea66c23d5cacfb66

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\S64KWKX9\favicon-32x32-anonfiles[1].png
            Filesize

            1KB

            MD5

            ee0e6dd4ef643128a1b7bd4ab32b8a79

            SHA1

            8136c70aac1e50f8356c83f91fb77ea4b6596cbc

            SHA256

            51f305558b4ed6fcf3a31b4f9e404fc2ea426cb5e785ac46ce827de0c5cabb4c

            SHA512

            f57a1882e4d57f6cdb67fc5b8ed61d0dba28f000af87644bfd402275958163b66f7748b83e4d78dff72bb8edd9077c3fe67f5e831a6b79bce72ca4bd1d086b34

          • C:\Users\Admin\AppData\Local\Temp\~DF86605B6B81941519.TMP
            Filesize

            16KB

            MD5

            491f0b2ce253cbcd75177c366c523a8d

            SHA1

            f77c62efa00084daf8a64b25dbd200611f8c863e

            SHA256

            7f0b6095c06a6d83d01d473030d5d71d438f06e2711a3e6eb0961859d726dec5

            SHA512

            a15d6dba64f2ca4b55f5d853f91d033f9d588ce83c579af3ce1cbd554837ad66f6ce4d93428ae2931b093c9b6fdb79f98791af7ce0ebbcbd12583b27f7ef3eab

          • C:\Users\Admin\Downloads\Loader.exe
            Filesize

            3.6MB

            MD5

            9604974a71e163598982d7ad55145d1d

            SHA1

            c3b02537ff8fded1abb33df88144dc99ee881ba9

            SHA256

            7f32b63eba8bb7cc8273a4eb5860812deda884752e3917ab748a036ffdb61620

            SHA512

            09f0c56a4f227fae5ff2ab31ebc022d7a53db58abaa3bf9d7251864fece235b0e21cda7fc9aae6a334b3959c8e0f295d342b64d02c18f27e31a1614c4e6477c5

          • C:\Users\Admin\Downloads\Loader.exe.spor0ab.partial
            Filesize

            3.6MB

            MD5

            9604974a71e163598982d7ad55145d1d

            SHA1

            c3b02537ff8fded1abb33df88144dc99ee881ba9

            SHA256

            7f32b63eba8bb7cc8273a4eb5860812deda884752e3917ab748a036ffdb61620

            SHA512

            09f0c56a4f227fae5ff2ab31ebc022d7a53db58abaa3bf9d7251864fece235b0e21cda7fc9aae6a334b3959c8e0f295d342b64d02c18f27e31a1614c4e6477c5

          • memory/4540-216-0x00007FF6F32E0000-0x00007FF6F3C8A000-memory.dmp
            Filesize

            9.7MB

          • memory/4540-215-0x00007FF6F32E0000-0x00007FF6F3C8A000-memory.dmp
            Filesize

            9.7MB

          • memory/4540-217-0x00007FF6F32E0000-0x00007FF6F3C8A000-memory.dmp
            Filesize

            9.7MB

          • memory/4540-218-0x00007FF6F32E0000-0x00007FF6F3C8A000-memory.dmp
            Filesize

            9.7MB

          • memory/4540-274-0x00007FF6F32E0000-0x00007FF6F3C8A000-memory.dmp
            Filesize

            9.7MB

          • memory/4540-349-0x00007FF6F32E0000-0x00007FF6F3C8A000-memory.dmp
            Filesize

            9.7MB

          • memory/4540-214-0x00007FF6F32E0000-0x00007FF6F3C8A000-memory.dmp
            Filesize

            9.7MB

          • memory/4540-436-0x00007FF6F32E0000-0x00007FF6F3C8A000-memory.dmp
            Filesize

            9.7MB

          • memory/4540-451-0x00007FF6F32E0000-0x00007FF6F3C8A000-memory.dmp
            Filesize

            9.7MB