Analysis
-
max time kernel
43s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04-04-2023 15:30
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20230220-en
windows7-x64
9 signatures
150 seconds
General
-
Target
Setup.exe
-
Size
11.0MB
-
MD5
c0c44044d48102ffe57e0adc86b68a7e
-
SHA1
8d423d0ba235843be9671f08bfc6df032607f6c4
-
SHA256
7532b02e6159a99599dafed8f44f51f9a4e4a10ce4784311ffdd682053e29c12
-
SHA512
977a342eb1b5bc8a6d6f65e54bdf42f666cccc3467d04374e7493202c6160cb82df815c68642c0166ae82b69aac46cb94d75efa1e337e9ada727584c3ae9837e
-
SSDEEP
196608:4+hMmu0Vro/dFqg4cF3VjgY7lEGpDltGgC891SWAo0Gm:41m3OMEljl7lPftGgPuDrt
Score
9/10
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Setup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1704 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1704 Setup.exe 992 powershell.exe 1704 Setup.exe 1704 Setup.exe 1704 Setup.exe 1704 Setup.exe 1704 Setup.exe 1704 Setup.exe 1704 Setup.exe 1704 Setup.exe 1704 Setup.exe 1704 Setup.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 992 powershell.exe Token: SeDebugPrivilege 1704 Setup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1704 wrote to memory of 992 1704 Setup.exe 26 PID 1704 wrote to memory of 992 1704 Setup.exe 26 PID 1704 wrote to memory of 992 1704 Setup.exe 26 PID 1704 wrote to memory of 992 1704 Setup.exe 26 PID 1704 wrote to memory of 1944 1704 Setup.exe 28 PID 1704 wrote to memory of 1944 1704 Setup.exe 28 PID 1704 wrote to memory of 1944 1704 Setup.exe 28 PID 1704 wrote to memory of 1944 1704 Setup.exe 28 PID 1704 wrote to memory of 1944 1704 Setup.exe 28 PID 1704 wrote to memory of 1944 1704 Setup.exe 28 PID 1704 wrote to memory of 1944 1704 Setup.exe 28 PID 1704 wrote to memory of 672 1704 Setup.exe 29 PID 1704 wrote to memory of 672 1704 Setup.exe 29 PID 1704 wrote to memory of 672 1704 Setup.exe 29 PID 1704 wrote to memory of 672 1704 Setup.exe 29 PID 1704 wrote to memory of 672 1704 Setup.exe 29 PID 1704 wrote to memory of 672 1704 Setup.exe 29 PID 1704 wrote to memory of 672 1704 Setup.exe 29 PID 1704 wrote to memory of 324 1704 Setup.exe 30 PID 1704 wrote to memory of 324 1704 Setup.exe 30 PID 1704 wrote to memory of 324 1704 Setup.exe 30 PID 1704 wrote to memory of 324 1704 Setup.exe 30 PID 1704 wrote to memory of 324 1704 Setup.exe 30 PID 1704 wrote to memory of 324 1704 Setup.exe 30 PID 1704 wrote to memory of 324 1704 Setup.exe 30 PID 1704 wrote to memory of 340 1704 Setup.exe 31 PID 1704 wrote to memory of 340 1704 Setup.exe 31 PID 1704 wrote to memory of 340 1704 Setup.exe 31 PID 1704 wrote to memory of 340 1704 Setup.exe 31 PID 1704 wrote to memory of 340 1704 Setup.exe 31 PID 1704 wrote to memory of 340 1704 Setup.exe 31 PID 1704 wrote to memory of 340 1704 Setup.exe 31 PID 1704 wrote to memory of 1868 1704 Setup.exe 32 PID 1704 wrote to memory of 1868 1704 Setup.exe 32 PID 1704 wrote to memory of 1868 1704 Setup.exe 32 PID 1704 wrote to memory of 1868 1704 Setup.exe 32 PID 1704 wrote to memory of 1868 1704 Setup.exe 32 PID 1704 wrote to memory of 1868 1704 Setup.exe 32 PID 1704 wrote to memory of 1868 1704 Setup.exe 32 PID 1704 wrote to memory of 1092 1704 Setup.exe 33 PID 1704 wrote to memory of 1092 1704 Setup.exe 33 PID 1704 wrote to memory of 1092 1704 Setup.exe 33 PID 1704 wrote to memory of 1092 1704 Setup.exe 33 PID 1704 wrote to memory of 1092 1704 Setup.exe 33 PID 1704 wrote to memory of 1092 1704 Setup.exe 33 PID 1704 wrote to memory of 1092 1704 Setup.exe 33 PID 1704 wrote to memory of 1624 1704 Setup.exe 34 PID 1704 wrote to memory of 1624 1704 Setup.exe 34 PID 1704 wrote to memory of 1624 1704 Setup.exe 34 PID 1704 wrote to memory of 1624 1704 Setup.exe 34 PID 1704 wrote to memory of 1624 1704 Setup.exe 34 PID 1704 wrote to memory of 1624 1704 Setup.exe 34 PID 1704 wrote to memory of 1624 1704 Setup.exe 34 PID 1704 wrote to memory of 888 1704 Setup.exe 36 PID 1704 wrote to memory of 888 1704 Setup.exe 36 PID 1704 wrote to memory of 888 1704 Setup.exe 36 PID 1704 wrote to memory of 888 1704 Setup.exe 36 PID 1704 wrote to memory of 888 1704 Setup.exe 36 PID 1704 wrote to memory of 888 1704 Setup.exe 36 PID 1704 wrote to memory of 888 1704 Setup.exe 36 PID 1704 wrote to memory of 1524 1704 Setup.exe 35 PID 1704 wrote to memory of 1524 1704 Setup.exe 35 PID 1704 wrote to memory of 1524 1704 Setup.exe 35 PID 1704 wrote to memory of 1524 1704 Setup.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQA1AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:992
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeC:\Users\Admin\AppData\Local\Temp\Setup.exe2⤵PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeC:\Users\Admin\AppData\Local\Temp\Setup.exe2⤵PID:672
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeC:\Users\Admin\AppData\Local\Temp\Setup.exe2⤵PID:324
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeC:\Users\Admin\AppData\Local\Temp\Setup.exe2⤵PID:340
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeC:\Users\Admin\AppData\Local\Temp\Setup.exe2⤵PID:1868
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeC:\Users\Admin\AppData\Local\Temp\Setup.exe2⤵PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeC:\Users\Admin\AppData\Local\Temp\Setup.exe2⤵PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeC:\Users\Admin\AppData\Local\Temp\Setup.exe2⤵PID:1524
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeC:\Users\Admin\AppData\Local\Temp\Setup.exe2⤵PID:888
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeC:\Users\Admin\AppData\Local\Temp\Setup.exe2⤵PID:1628
-