Analysis

  • max time kernel
    27s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2023, 06:22

General

  • Target

    fd4ff677931e296f6b608cd23fa19e7e3ce1a1a758d0521e637ac9fcdbd404b8.exe

  • Size

    4.6MB

  • MD5

    76f37b906c4a210e354d29eeac816b6d

  • SHA1

    2ef9c6c0835315be8805ce039b3c0e0db3c6ef67

  • SHA256

    fd4ff677931e296f6b608cd23fa19e7e3ce1a1a758d0521e637ac9fcdbd404b8

  • SHA512

    815b2594f4b40773bd8ec74ffee589d78ca49e4dcbf64bfd269af62a572d7b5f74f33de43788c68a7dff1d3da13343443b1d57b9b86d22b92aad1ae1014f79b7

  • SSDEEP

    98304:l06FOznLo0+Dd6uxc8FazgIGOU0AemtfdQqwWPU0Hnf8H69:l3F6n80W6uGO8bGeAjtfdiWPHnf8I

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 10 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd4ff677931e296f6b608cd23fa19e7e3ce1a1a758d0521e637ac9fcdbd404b8.exe
    "C:\Users\Admin\AppData\Local\Temp\fd4ff677931e296f6b608cd23fa19e7e3ce1a1a758d0521e637ac9fcdbd404b8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:824
    • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe
      "C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1744242 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\fd4ff677931e296f6b608cd23fa19e7e3ce1a1a758d0521e637ac9fcdbd404b8.exe" "__IRCT:0" "__IRTSS:0" "__IRSID:S-1-5-21-2647223082-2067913677-935928954-1000"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\un.exe
        "C:\un.exe" x -o+ -ppoiuytrewq C:\ProgramData\Data\upx.rar ziliao.jpg ziliao1.jpg C:\ProgramData\Microsoft\Program\
        3⤵
        • Executes dropped EXE
        PID:1536
      • C:\un.exe
        "C:\un.exe" x -o+ -ppoiuytrewq C:\ProgramData\Data\upx.rar iusb3mon.exe php-cgi.exe qbcore.dll C:\ProgramData\Program\
        3⤵
        • Executes dropped EXE
        PID:1680
      • C:\ProgramData\Program\php-cgi.exe
        "C:\ProgramData\Program\php-cgi.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:1332

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Data\UPX.rar

          Filesize

          1.9MB

          MD5

          21f02fd4ce141af298b352b8367b722a

          SHA1

          b38d3969aeaf665692d056ddb2f9b7ff29efaad9

          SHA256

          5bb75a6d1307e6c6c178623186ca7bd0a2e7f19763536a2e878243ab673ab39a

          SHA512

          dce44b34969cb050d6d8c37202980989045671a5ab995a023309633bc17e4a9fe51448162e504e41b5eff7c747058bafd499ff4ae3c34ef0dc0ca3117d50aa88

        • C:\ProgramData\Program\php-cgi.exe

          Filesize

          591KB

          MD5

          6c9faa530a79f516c85cfac8986656e5

          SHA1

          6a454009a2f1b0df3483ddffaed7e95d167d789d

          SHA256

          6d08bb136618e8aff1af1951abe0c918d0de59103af9a79b1fef3219bb2b97f4

          SHA512

          306a68dcc57243bcfb2f5e22df539b1e65546c895f989ef5a07f957fee34e4c7165e358a64248a85ca3647e6fb452674b32ec5922b4a17c83cc9411104f7c8c5

        • C:\ProgramData\Program\php-cgi.exe

          Filesize

          591KB

          MD5

          6c9faa530a79f516c85cfac8986656e5

          SHA1

          6a454009a2f1b0df3483ddffaed7e95d167d789d

          SHA256

          6d08bb136618e8aff1af1951abe0c918d0de59103af9a79b1fef3219bb2b97f4

          SHA512

          306a68dcc57243bcfb2f5e22df539b1e65546c895f989ef5a07f957fee34e4c7165e358a64248a85ca3647e6fb452674b32ec5922b4a17c83cc9411104f7c8c5

        • C:\ProgramData\Program\qbcore.dll

          Filesize

          1.5MB

          MD5

          a3f01d33a2f69ab23727cdd2c4858b20

          SHA1

          a9b5bf5d6772dba90199105b0841a5cfa8cb09a3

          SHA256

          e2daab9130cc7a8b9eadb8670c864b7faddb35125386551865a8893663551ff6

          SHA512

          502a8be36eda91298b6fd12627ca8d3dddf0e8e402f275de40438e33ebe832c92c6e14f2c3a60eea78b039108b0cf004c3f2a95d18b3cddc595e35e050e35aa4

        • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

          Filesize

          1.3MB

          MD5

          dec931e86140139380ea0df57cd132b6

          SHA1

          b717fd548382064189c16cb94dda28b1967a5712

          SHA256

          5ffd4b20dccfb84c8890abdb780184a7651e760aefba4ab0c6fba5b2a81f97d9

          SHA512

          14d594e88c4a1f0ec8bc1b4fe2d66e26358f907b1106c047ada35d500ca9e608f1ce5a57599453cf10f11f4d9f1948ced9056ce8bd944b16eca7e9b83e8b27af

        • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

          Filesize

          1.3MB

          MD5

          dec931e86140139380ea0df57cd132b6

          SHA1

          b717fd548382064189c16cb94dda28b1967a5712

          SHA256

          5ffd4b20dccfb84c8890abdb780184a7651e760aefba4ab0c6fba5b2a81f97d9

          SHA512

          14d594e88c4a1f0ec8bc1b4fe2d66e26358f907b1106c047ada35d500ca9e608f1ce5a57599453cf10f11f4d9f1948ced9056ce8bd944b16eca7e9b83e8b27af

        • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

          Filesize

          1.3MB

          MD5

          dec931e86140139380ea0df57cd132b6

          SHA1

          b717fd548382064189c16cb94dda28b1967a5712

          SHA256

          5ffd4b20dccfb84c8890abdb780184a7651e760aefba4ab0c6fba5b2a81f97d9

          SHA512

          14d594e88c4a1f0ec8bc1b4fe2d66e26358f907b1106c047ada35d500ca9e608f1ce5a57599453cf10f11f4d9f1948ced9056ce8bd944b16eca7e9b83e8b27af

        • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\lua5.1.dll

          Filesize

          318KB

          MD5

          b5fc476c1bf08d5161346cc7dd4cb0ba

          SHA1

          280fac9cf711d93c95f6b80ac97d89cf5853c096

          SHA256

          12cb9b8f59c00ef40ea8f28bfc59a29f12dc28332bf44b1a5d8d6a8823365650

          SHA512

          17fa97f399287b941e958d2d42fe6adb62700b01d9dbe0c824604e8e06d903b330f9d7d8ffb109bfb7f6742f46e7e9cedad6981f0d94d629b8402d0a0174f697

        • C:\un.exe

          Filesize

          512KB

          MD5

          5bda37f25c6cbaab7bb2f36886eee4ae

          SHA1

          ce10a26fbac92e78a739b0b3b7ec3fb0f42ee32f

          SHA256

          22405d814d2bdb39a1b67757ed0d1357ba8b0a0bf3e614619d8e3d32e38d8d7b

          SHA512

          2a79a6dd4633890877c68227383fbe8248bd57689109cf7f7dbd037a14f4b6c8c88c19514bd17daf405ce5109708ef8f5816764256c28af67a335fbac73a00b4

        • C:\un.exe

          Filesize

          512KB

          MD5

          5bda37f25c6cbaab7bb2f36886eee4ae

          SHA1

          ce10a26fbac92e78a739b0b3b7ec3fb0f42ee32f

          SHA256

          22405d814d2bdb39a1b67757ed0d1357ba8b0a0bf3e614619d8e3d32e38d8d7b

          SHA512

          2a79a6dd4633890877c68227383fbe8248bd57689109cf7f7dbd037a14f4b6c8c88c19514bd17daf405ce5109708ef8f5816764256c28af67a335fbac73a00b4

        • \ProgramData\Program\php-cgi.exe

          Filesize

          591KB

          MD5

          6c9faa530a79f516c85cfac8986656e5

          SHA1

          6a454009a2f1b0df3483ddffaed7e95d167d789d

          SHA256

          6d08bb136618e8aff1af1951abe0c918d0de59103af9a79b1fef3219bb2b97f4

          SHA512

          306a68dcc57243bcfb2f5e22df539b1e65546c895f989ef5a07f957fee34e4c7165e358a64248a85ca3647e6fb452674b32ec5922b4a17c83cc9411104f7c8c5

        • \ProgramData\Program\php-cgi.exe

          Filesize

          591KB

          MD5

          6c9faa530a79f516c85cfac8986656e5

          SHA1

          6a454009a2f1b0df3483ddffaed7e95d167d789d

          SHA256

          6d08bb136618e8aff1af1951abe0c918d0de59103af9a79b1fef3219bb2b97f4

          SHA512

          306a68dcc57243bcfb2f5e22df539b1e65546c895f989ef5a07f957fee34e4c7165e358a64248a85ca3647e6fb452674b32ec5922b4a17c83cc9411104f7c8c5

        • \ProgramData\Program\php-cgi.exe

          Filesize

          591KB

          MD5

          6c9faa530a79f516c85cfac8986656e5

          SHA1

          6a454009a2f1b0df3483ddffaed7e95d167d789d

          SHA256

          6d08bb136618e8aff1af1951abe0c918d0de59103af9a79b1fef3219bb2b97f4

          SHA512

          306a68dcc57243bcfb2f5e22df539b1e65546c895f989ef5a07f957fee34e4c7165e358a64248a85ca3647e6fb452674b32ec5922b4a17c83cc9411104f7c8c5

        • \ProgramData\Program\qbcore.dll

          Filesize

          1.5MB

          MD5

          a3f01d33a2f69ab23727cdd2c4858b20

          SHA1

          a9b5bf5d6772dba90199105b0841a5cfa8cb09a3

          SHA256

          e2daab9130cc7a8b9eadb8670c864b7faddb35125386551865a8893663551ff6

          SHA512

          502a8be36eda91298b6fd12627ca8d3dddf0e8e402f275de40438e33ebe832c92c6e14f2c3a60eea78b039108b0cf004c3f2a95d18b3cddc595e35e050e35aa4

        • \Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

          Filesize

          1.3MB

          MD5

          dec931e86140139380ea0df57cd132b6

          SHA1

          b717fd548382064189c16cb94dda28b1967a5712

          SHA256

          5ffd4b20dccfb84c8890abdb780184a7651e760aefba4ab0c6fba5b2a81f97d9

          SHA512

          14d594e88c4a1f0ec8bc1b4fe2d66e26358f907b1106c047ada35d500ca9e608f1ce5a57599453cf10f11f4d9f1948ced9056ce8bd944b16eca7e9b83e8b27af

        • \Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

          Filesize

          1.3MB

          MD5

          dec931e86140139380ea0df57cd132b6

          SHA1

          b717fd548382064189c16cb94dda28b1967a5712

          SHA256

          5ffd4b20dccfb84c8890abdb780184a7651e760aefba4ab0c6fba5b2a81f97d9

          SHA512

          14d594e88c4a1f0ec8bc1b4fe2d66e26358f907b1106c047ada35d500ca9e608f1ce5a57599453cf10f11f4d9f1948ced9056ce8bd944b16eca7e9b83e8b27af

        • \Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

          Filesize

          1.3MB

          MD5

          dec931e86140139380ea0df57cd132b6

          SHA1

          b717fd548382064189c16cb94dda28b1967a5712

          SHA256

          5ffd4b20dccfb84c8890abdb780184a7651e760aefba4ab0c6fba5b2a81f97d9

          SHA512

          14d594e88c4a1f0ec8bc1b4fe2d66e26358f907b1106c047ada35d500ca9e608f1ce5a57599453cf10f11f4d9f1948ced9056ce8bd944b16eca7e9b83e8b27af

        • \Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

          Filesize

          1.3MB

          MD5

          dec931e86140139380ea0df57cd132b6

          SHA1

          b717fd548382064189c16cb94dda28b1967a5712

          SHA256

          5ffd4b20dccfb84c8890abdb780184a7651e760aefba4ab0c6fba5b2a81f97d9

          SHA512

          14d594e88c4a1f0ec8bc1b4fe2d66e26358f907b1106c047ada35d500ca9e608f1ce5a57599453cf10f11f4d9f1948ced9056ce8bd944b16eca7e9b83e8b27af

        • \Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

          Filesize

          1.3MB

          MD5

          dec931e86140139380ea0df57cd132b6

          SHA1

          b717fd548382064189c16cb94dda28b1967a5712

          SHA256

          5ffd4b20dccfb84c8890abdb780184a7651e760aefba4ab0c6fba5b2a81f97d9

          SHA512

          14d594e88c4a1f0ec8bc1b4fe2d66e26358f907b1106c047ada35d500ca9e608f1ce5a57599453cf10f11f4d9f1948ced9056ce8bd944b16eca7e9b83e8b27af

        • \Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\lua5.1.dll

          Filesize

          318KB

          MD5

          b5fc476c1bf08d5161346cc7dd4cb0ba

          SHA1

          280fac9cf711d93c95f6b80ac97d89cf5853c096

          SHA256

          12cb9b8f59c00ef40ea8f28bfc59a29f12dc28332bf44b1a5d8d6a8823365650

          SHA512

          17fa97f399287b941e958d2d42fe6adb62700b01d9dbe0c824604e8e06d903b330f9d7d8ffb109bfb7f6742f46e7e9cedad6981f0d94d629b8402d0a0174f697

        • memory/824-71-0x0000000002E60000-0x000000000322B000-memory.dmp

          Filesize

          3.8MB

        • memory/824-72-0x0000000002E60000-0x000000000322B000-memory.dmp

          Filesize

          3.8MB

        • memory/1332-122-0x0000000074280000-0x0000000074414000-memory.dmp

          Filesize

          1.6MB

        • memory/1332-123-0x00000000020B0000-0x00000000020B1000-memory.dmp

          Filesize

          4KB

        • memory/2028-73-0x0000000000400000-0x00000000007CB000-memory.dmp

          Filesize

          3.8MB

        • memory/2028-120-0x0000000003380000-0x0000000003390000-memory.dmp

          Filesize

          64KB

        • memory/2028-119-0x0000000000400000-0x00000000007CB000-memory.dmp

          Filesize

          3.8MB