Analysis
-
max time kernel
71s -
max time network
67s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2023 22:16
Static task
static1
Behavioral task
behavioral1
Sample
9496629c92a2e39342e92ebb495615c6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9496629c92a2e39342e92ebb495615c6.exe
Resource
win10v2004-20230220-en
General
-
Target
9496629c92a2e39342e92ebb495615c6.exe
-
Size
604KB
-
MD5
9496629c92a2e39342e92ebb495615c6
-
SHA1
13f99e13b95f949260c254545cee88cea39e991d
-
SHA256
cbd3e106e4397133983cbd43f8f7f3d9b9957a12c7fe8c65a936490a3b62d212
-
SHA512
c933a5c2679bef2048381e5574c33f9917a80a252839e3160aabdb98a62f61b17d40687ac6b2b7635e8caba643048c5791fb37c9979b23ec652d8c3cc3315dea
-
SSDEEP
12288:e/fEu+Hdsy7MfSu9xoF3bUnY6yNijq0XL:uEu+HdsAMqu9xoEygjq07
Malware Config
Signatures
-
Enumerates VirtualBox DLL files 2 TTPs 10 IoCs
description ioc Process File opened (read-only) C:\windows\System32\vboxoglpassthroughspu.dll 9496629c92a2e39342e92ebb495615c6.exe File opened (read-only) C:\windows\System32\vboxhook.dll 9496629c92a2e39342e92ebb495615c6.exe File opened (read-only) C:\windows\System32\vboxmrxnp.dll 9496629c92a2e39342e92ebb495615c6.exe File opened (read-only) C:\windows\System32\vboxoglerrorspu.dll 9496629c92a2e39342e92ebb495615c6.exe File opened (read-only) C:\windows\System32\vboxoglfeedbackspu.dll 9496629c92a2e39342e92ebb495615c6.exe File opened (read-only) C:\windows\System32\vboxoglpackspu.dll 9496629c92a2e39342e92ebb495615c6.exe File opened (read-only) C:\windows\System32\vboxdisp.dll 9496629c92a2e39342e92ebb495615c6.exe File opened (read-only) C:\windows\System32\vboxogl.dll 9496629c92a2e39342e92ebb495615c6.exe File opened (read-only) C:\windows\System32\vboxoglarrayspu.dll 9496629c92a2e39342e92ebb495615c6.exe File opened (read-only) C:\windows\System32\vboxoglcrutil.dll 9496629c92a2e39342e92ebb495615c6.exe -
Looks for VirtualBox drivers on disk 2 TTPs 4 IoCs
description ioc Process File opened (read-only) C:\windows\System32\drivers\VBoxGuest.sys 9496629c92a2e39342e92ebb495615c6.exe File opened (read-only) C:\windows\System32\drivers\VBoxSF.sys 9496629c92a2e39342e92ebb495615c6.exe File opened (read-only) C:\windows\System32\drivers\VBoxVideo.sys 9496629c92a2e39342e92ebb495615c6.exe File opened (read-only) C:\windows\System32\drivers\VBoxMouse.sys 9496629c92a2e39342e92ebb495615c6.exe -
Looks for VirtualBox executables on disk 2 TTPs 3 IoCs
description ioc Process File opened (read-only) C:\windows\System32\VBoxControl.exe 9496629c92a2e39342e92ebb495615c6.exe File opened (read-only) C:\windows\System32\vboxservice.exe 9496629c92a2e39342e92ebb495615c6.exe File opened (read-only) C:\windows\System32\vboxtray.exe 9496629c92a2e39342e92ebb495615c6.exe -
Looks for VMWare drivers on disk 2 TTPs 4 IoCs
description ioc Process File opened (read-only) C:\windows\System32\drivers\Vmmouse.sys 9496629c92a2e39342e92ebb495615c6.exe File opened (read-only) C:\Windows\System32\drivers\vmhgfs.sys 9496629c92a2e39342e92ebb495615c6.exe File opened (read-only) C:\Windows\System32\drivers\vmmemctl.sys 9496629c92a2e39342e92ebb495615c6.exe File opened (read-only) C:\Windows\System32\drivers\vmmouse.sys 9496629c92a2e39342e92ebb495615c6.exe -
Executes dropped EXE 1 IoCs
pid Process 1116 embedded.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3328 3956 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 5072 wrote to memory of 3216 5072 9496629c92a2e39342e92ebb495615c6.exe 80 PID 5072 wrote to memory of 3216 5072 9496629c92a2e39342e92ebb495615c6.exe 80 PID 5072 wrote to memory of 3216 5072 9496629c92a2e39342e92ebb495615c6.exe 80 PID 3216 wrote to memory of 1116 3216 cmd.exe 81 PID 3216 wrote to memory of 1116 3216 cmd.exe 81 PID 3216 wrote to memory of 1116 3216 cmd.exe 81 PID 1116 wrote to memory of 3956 1116 embedded.exe 82 PID 1116 wrote to memory of 3956 1116 embedded.exe 82 PID 1116 wrote to memory of 3956 1116 embedded.exe 82 PID 1116 wrote to memory of 3956 1116 embedded.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\9496629c92a2e39342e92ebb495615c6.exe"C:\Users\Admin\AppData\Local\Temp\9496629c92a2e39342e92ebb495615c6.exe"1⤵
- Enumerates VirtualBox DLL files
- Looks for VirtualBox drivers on disk
- Looks for VirtualBox executables on disk
- Looks for VMWare drivers on disk
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c embedded.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\embedded.exeembedded.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 4085⤵
- Program crash
PID:3328
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 192 -p 3956 -ip 39561⤵PID:4756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5140d24af0c2b3a18529df12dfbc5f6de
SHA1e8db5ad2b7ffede3e41b9c3adb24f3232d764931
SHA2564eabb1adc035f035e010c0d0d259c683e18193f509946652ed8aa7c5d92b6a92
SHA512a2ead649f155555ec3e55800494f833d18cea68afe736807ec23b5991242928a0853e451b60894ec8e0abe8c42db341c2237007981f38f0366fd7c6ecafb7415
-
Filesize
66KB
MD5140d24af0c2b3a18529df12dfbc5f6de
SHA1e8db5ad2b7ffede3e41b9c3adb24f3232d764931
SHA2564eabb1adc035f035e010c0d0d259c683e18193f509946652ed8aa7c5d92b6a92
SHA512a2ead649f155555ec3e55800494f833d18cea68afe736807ec23b5991242928a0853e451b60894ec8e0abe8c42db341c2237007981f38f0366fd7c6ecafb7415