Analysis
-
max time kernel
152s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-05-2023 17:56
Behavioral task
behavioral1
Sample
Crunchyroll_p_.exe
Resource
win7-20230220-en
General
-
Target
Crunchyroll_p_.exe
-
Size
9.2MB
-
MD5
e7d1a006917f10e419f0e506a98e385b
-
SHA1
14b28ce35fbeafe10d629ffd7a12ac017876bfda
-
SHA256
c66f10a5fc23b02ad11b77786c17ea54f68912156cafb227bfef5aab69b38b91
-
SHA512
af34bcd208d9e3e2a1c1af2147bff2cc6a44e1008181410e4ba377e0d902cc7dc0a077d575c167dec059fa27af6123e3690512934b19d23618e51794b41af6b6
-
SSDEEP
98304:HD6asPKgZViQqyYiwdLTgmOSjr4Wz3Wch+jMnlL0jaDvLZsDawHm+tiyOweb8xI1:j6asPZ3LqjxFBz+uD19wG+tivwebr3n
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Crunchyroll_p_.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Crunchyroll_p_.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Crunchyroll_p_.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Crunchyroll_p_.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Crunchyroll_p_.exe -
Obfuscated with Agile.Net obfuscator 3 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1688-54-0x0000000000400000-0x0000000000660000-memory.dmp agile_net behavioral1/memory/1688-55-0x0000000000400000-0x0000000000612000-memory.dmp agile_net behavioral1/memory/1688-81-0x0000000000400000-0x0000000000660000-memory.dmp agile_net -
Processes:
resource yara_rule behavioral1/memory/1688-58-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1688-64-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1688-66-0x0000000005250000-0x0000000005864000-memory.dmp themida behavioral1/memory/1688-68-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1688-69-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1688-70-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1688-71-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1688-72-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1688-73-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1688-75-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1688-79-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1688-89-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1688-91-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1688-99-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1688-102-0x0000000002660000-0x00000000026A0000-memory.dmp themida behavioral1/memory/1688-106-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1688-116-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1688-137-0x0000000010000000-0x0000000010C35000-memory.dmp themida -
Processes:
Crunchyroll_p_.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Crunchyroll_p_.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Crunchyroll_p_.exepid process 1688 Crunchyroll_p_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 20 IoCs
Processes:
Crunchyroll_p_.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Crunchyroll_p_.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Crunchyroll_p_.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" Crunchyroll_p_.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_Classes\Local Settings Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg Crunchyroll_p_.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewVersion = "0" Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f4225481e03947bc34db131e946b44c8dd50000 Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Crunchyroll_p_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Crunchyroll_p_.exepid process 1688 Crunchyroll_p_.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
Crunchyroll_p_.exepid process 1688 Crunchyroll_p_.exe 1688 Crunchyroll_p_.exe 1688 Crunchyroll_p_.exe 1688 Crunchyroll_p_.exe 1688 Crunchyroll_p_.exe 1688 Crunchyroll_p_.exe 1688 Crunchyroll_p_.exe 1688 Crunchyroll_p_.exe 1688 Crunchyroll_p_.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Crunchyroll_p_.exe"C:\Users\Admin\AppData\Local\Temp\Crunchyroll_p_.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1688-54-0x0000000000400000-0x0000000000660000-memory.dmpFilesize
2.4MB
-
memory/1688-55-0x0000000000400000-0x0000000000612000-memory.dmpFilesize
2.1MB
-
memory/1688-58-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1688-64-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1688-65-0x00000000FFE00000-0x00000000FFFA7000-memory.dmpFilesize
1.7MB
-
memory/1688-66-0x0000000005250000-0x0000000005864000-memory.dmpFilesize
6.1MB
-
memory/1688-67-0x0000000004E50000-0x0000000004F31000-memory.dmpFilesize
900KB
-
memory/1688-68-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1688-69-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1688-70-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1688-71-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1688-72-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1688-73-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1688-76-0x0000000073F20000-0x0000000073FA0000-memory.dmpFilesize
512KB
-
memory/1688-75-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1688-79-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1688-81-0x0000000000400000-0x0000000000660000-memory.dmpFilesize
2.4MB
-
memory/1688-83-0x0000000004F80000-0x0000000004F9C000-memory.dmpFilesize
112KB
-
memory/1688-87-0x0000000004F80000-0x0000000004F9C000-memory.dmpFilesize
112KB
-
memory/1688-89-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1688-91-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1688-94-0x0000000005390000-0x00000000053B6000-memory.dmpFilesize
152KB
-
memory/1688-99-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1688-102-0x0000000002660000-0x00000000026A0000-memory.dmpFilesize
256KB
-
memory/1688-103-0x0000000004F80000-0x0000000004F9C000-memory.dmpFilesize
112KB
-
memory/1688-104-0x0000000007BD0000-0x0000000007BD1000-memory.dmpFilesize
4KB
-
memory/1688-106-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1688-109-0x0000000005390000-0x00000000053B6000-memory.dmpFilesize
152KB
-
memory/1688-110-0x0000000002660000-0x00000000026A0000-memory.dmpFilesize
256KB
-
memory/1688-116-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1688-137-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB