Analysis
-
max time kernel
141s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2023 18:50
Behavioral task
behavioral1
Sample
25699.exe
Resource
win7-20230220-en
General
-
Target
25699.exe
-
Size
2.4MB
-
MD5
82c0ea37fa4d25fd9556659ba22fbfdf
-
SHA1
08cecc5f3714a39447d88714493b66d3df2b7a12
-
SHA256
a32e731baddc519cde9930319a87f560876b44efd27788abd17aa77f57a6cc55
-
SHA512
684a23d91ff852de79571359f45f6790acbbc6c9f2c5f8714456129bd89b8edf56173842785cc2113c0eefa7472896c596efb0cd48bea16e3a4f620594ef4b59
-
SSDEEP
49152:eSWOqABIDBtxGV113malzYFdwQ+bDYc/mUN3XUzn6Hyxwst6/S35d:jh/cxGVPvtYfwQiRmSXyGyq6xn
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
25699.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 25699.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
25699.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 25699.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 25699.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
25699.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Wine 25699.exe -
Loads dropped DLL 1 IoCs
Processes:
25699.exepid process 4236 25699.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral2/memory/4236-133-0x0000000000B10000-0x0000000000D7A000-memory.dmp agile_net -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
25699.exedescription pid process Token: SeDebugPrivilege 4236 25699.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25699.exe"C:\Users\Admin\AppData\Local\Temp\25699.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7225caef-53af-4afb-9a7d-c0711f2399d4\AgileDotNetRT.dllFilesize
1001KB
MD5010b142d96142a41386a230cb4971f08
SHA1b81d4210d81665313f5a3e5c98fd04df7bf35054
SHA256de233f717a07db6d9089033f62ad458474b6eb52c360736b5bab1792f6ba70e2
SHA5122817043c370fd92c7c997ba476426597b5819d199f35f8f0542e0b6ad112f6e6a7f471ff027e633f11f6bda7f5e022cd74b4d5dd8c3e49d8fe685b77aea83243
-
C:\Users\Admin\AppData\Local\Temp\7225caef-53af-4afb-9a7d-c0711f2399d4\AgileDotNetRT.dllFilesize
1001KB
MD5010b142d96142a41386a230cb4971f08
SHA1b81d4210d81665313f5a3e5c98fd04df7bf35054
SHA256de233f717a07db6d9089033f62ad458474b6eb52c360736b5bab1792f6ba70e2
SHA5122817043c370fd92c7c997ba476426597b5819d199f35f8f0542e0b6ad112f6e6a7f471ff027e633f11f6bda7f5e022cd74b4d5dd8c3e49d8fe685b77aea83243
-
memory/4236-153-0x0000000072ED0000-0x00000000731A0000-memory.dmpFilesize
2.8MB
-
memory/4236-166-0x0000000072ED0000-0x00000000731A0000-memory.dmpFilesize
2.8MB
-
memory/4236-141-0x0000000005920000-0x0000000005930000-memory.dmpFilesize
64KB
-
memory/4236-144-0x0000000073C30000-0x0000000073CB9000-memory.dmpFilesize
548KB
-
memory/4236-145-0x0000000008150000-0x00000000086F4000-memory.dmpFilesize
5.6MB
-
memory/4236-146-0x0000000007C40000-0x0000000007CD2000-memory.dmpFilesize
584KB
-
memory/4236-147-0x00000000078C0000-0x00000000078C1000-memory.dmpFilesize
4KB
-
memory/4236-148-0x00000000078B0000-0x00000000078B1000-memory.dmpFilesize
4KB
-
memory/4236-150-0x00000000078E0000-0x00000000078E1000-memory.dmpFilesize
4KB
-
memory/4236-149-0x00000000078A0000-0x00000000078A1000-memory.dmpFilesize
4KB
-
memory/4236-151-0x0000000007BB0000-0x0000000007BBA000-memory.dmpFilesize
40KB
-
memory/4236-152-0x0000000005920000-0x0000000005930000-memory.dmpFilesize
64KB
-
memory/4236-168-0x0000000072ED0000-0x00000000731A0000-memory.dmpFilesize
2.8MB
-
memory/4236-142-0x0000000072ED0000-0x00000000731A0000-memory.dmpFilesize
2.8MB
-
memory/4236-159-0x0000000072ED0000-0x00000000731A0000-memory.dmpFilesize
2.8MB
-
memory/4236-156-0x0000000072ED0000-0x00000000731A0000-memory.dmpFilesize
2.8MB
-
memory/4236-157-0x0000000072ED0000-0x00000000731A0000-memory.dmpFilesize
2.8MB
-
memory/4236-158-0x0000000072ED0000-0x00000000731A0000-memory.dmpFilesize
2.8MB
-
memory/4236-155-0x0000000005920000-0x0000000005930000-memory.dmpFilesize
64KB
-
memory/4236-160-0x0000000072ED0000-0x00000000731A0000-memory.dmpFilesize
2.8MB
-
memory/4236-161-0x0000000072ED0000-0x00000000731A0000-memory.dmpFilesize
2.8MB
-
memory/4236-162-0x0000000072ED0000-0x00000000731A0000-memory.dmpFilesize
2.8MB
-
memory/4236-163-0x0000000072ED0000-0x00000000731A0000-memory.dmpFilesize
2.8MB
-
memory/4236-164-0x0000000072ED0000-0x00000000731A0000-memory.dmpFilesize
2.8MB
-
memory/4236-165-0x0000000072ED0000-0x00000000731A0000-memory.dmpFilesize
2.8MB
-
memory/4236-154-0x0000000005920000-0x0000000005930000-memory.dmpFilesize
64KB
-
memory/4236-167-0x0000000072ED0000-0x00000000731A0000-memory.dmpFilesize
2.8MB
-
memory/4236-133-0x0000000000B10000-0x0000000000D7A000-memory.dmpFilesize
2.4MB