Analysis
-
max time kernel
154s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29-04-2023 09:55
Behavioral task
behavioral1
Sample
Inno/InnoInstaller.exe
Resource
win7-20230220-en
General
-
Target
Inno/InnoInstaller.exe
-
Size
1019.0MB
-
MD5
801879d5b7a0c86a30552dafbbf1460d
-
SHA1
d1aca891358f0fd24e12a759e4cafbcd7be909b7
-
SHA256
9c98187745a94a9687536aac12711617c55a411c9ba231791924236f3627cde5
-
SHA512
fc8b64f350c1bf6a9a516f9a80906c4ecbf5b75f9982a596cf946aa88c7b338e62824811484afeeaa539567e0b19d0e319a764eaf21764b332408760a14b420d
-
SSDEEP
98304:XHpb2umYIoREUsoGytV4n0oj8tb3gCHg1dWmX:Xdlm7AEQGyD4E39AvtX
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
InnoInstaller.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ InnoInstaller.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
InnoInstaller.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion InnoInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion InnoInstaller.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1976-57-0x0000000000260000-0x0000000000C08000-memory.dmp agile_net behavioral1/memory/1976-58-0x0000000000260000-0x0000000000C08000-memory.dmp agile_net -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/1976-57-0x0000000000260000-0x0000000000C08000-memory.dmp themida behavioral1/memory/1976-56-0x0000000000260000-0x0000000000C08000-memory.dmp themida behavioral1/memory/1976-58-0x0000000000260000-0x0000000000C08000-memory.dmp themida -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
InnoInstaller.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA InnoInstaller.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
InnoInstaller.exepid process 1976 InnoInstaller.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1800 1976 WerFault.exe InnoInstaller.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
InnoInstaller.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 InnoInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier InnoInstaller.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
InnoInstaller.exepid process 1976 InnoInstaller.exe 1976 InnoInstaller.exe 1976 InnoInstaller.exe 1976 InnoInstaller.exe 1976 InnoInstaller.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
InnoInstaller.exedescription pid process Token: SeDebugPrivilege 1976 InnoInstaller.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
InnoInstaller.exedescription pid process target process PID 1976 wrote to memory of 1800 1976 InnoInstaller.exe WerFault.exe PID 1976 wrote to memory of 1800 1976 InnoInstaller.exe WerFault.exe PID 1976 wrote to memory of 1800 1976 InnoInstaller.exe WerFault.exe PID 1976 wrote to memory of 1800 1976 InnoInstaller.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Inno\InnoInstaller.exe"C:\Users\Admin\AppData\Local\Temp\Inno\InnoInstaller.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 18922⤵
- Program crash
PID:1800
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\19356edbacbd20516554b02cddfad429\Admin@[email protected]\Software.txt
Filesize4KB
MD50deddb3cd02f97a1b29228e249b3b365
SHA1fecda2c925798a04ad17871124a441dd96ae1730
SHA256f347f9e4d3dd0ce266a5d225c0471e33386c659c6c2425a1b2e625864e538b9b
SHA51223d186926572a79bd7cec17ddfc8dc49e97097636cf34cdbc4a8b3d6b590362635cb41200da96385cbc9da4d255cef65bf5bf2cd964c37c331ef9d1dec50eeb0