Resubmissions

04/06/2023, 16:31

230604-t1hh5acf88 9

04/06/2023, 16:30

230604-tzxlnacf87 9

Analysis

  • max time kernel
    16s
  • max time network
    18s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/06/2023, 16:31

General

  • Target

    DiscordSetup.exe

  • Size

    5.3MB

  • MD5

    9cce9ee0020b6f3771ffea7f00fddae0

  • SHA1

    9b35d27cc87d54413ba920fb0ba46d437bb2a285

  • SHA256

    4286f05225b773ba95830a248e111cb47a12f4a3cb60d8f823a6cb8a461ccb98

  • SHA512

    d71b4cd71369e0befc95770faff086be529455b6e281dc728dbbf6e568ec8b41ce926b61b70a998c14080094c5a25d74ad313dbcead1d960ecbf6ac118e0f038

  • SSDEEP

    98304:aKoJzvhoTYC61CGlcnn2pL3+Skbr7oOCvpn3sgJxzz5sjwiYHJf:aTR5okC61CGlcn2V6bvU2grzijMl

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DiscordSetup.exe
    "C:\Users\Admin\AppData\Local\Temp\DiscordSetup.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3536
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /F /T /IM wordpad.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4624
      • C:\Windows\system32\taskkill.exe
        taskkill /F /T /IM wordpad.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4396
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c wmic PATH Win32_DesktopMonitor GET PNPDeviceID
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3928
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic PATH Win32_DesktopMonitor GET PNPDeviceID
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4632
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c wmic PATH Win32_DesktopMonitor GET PNPDeviceID
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4540
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic PATH Win32_DesktopMonitor GET PNPDeviceID
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1552

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3536-119-0x00007FF6C63D0000-0x00007FF6C7210000-memory.dmp

    Filesize

    14.2MB

  • memory/3536-125-0x00000220AA920000-0x00000220AAA20000-memory.dmp

    Filesize

    1024KB

  • memory/3536-134-0x00000220AA920000-0x00000220AAA20000-memory.dmp

    Filesize

    1024KB