Resubmissions

15/06/2023, 13:43

230615-q1ntcshd91 10

15/06/2023, 13:40

230615-qy1edahe32 10

15/06/2023, 12:34

230615-pr2s7agg72 10

Analysis

  • max time kernel
    72s
  • max time network
    79s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/06/2023, 13:40

General

  • Target

    Release-x64 (1).zip

  • Size

    22.1MB

  • MD5

    02308f5d3fd4d0dca0b1b84409124693

  • SHA1

    35f50b2cb9fe936037c8ddf9533d25598e1568ad

  • SHA256

    86d04cd48601528014a0781d1d491e033f88c7ef30d016103d5a8c4c04b07d3f

  • SHA512

    bb4e486e88deab530ef0109821b428166e7c6c444a76fe89ef4e5473c2766918ded17683600c68b5844e889b53fbe2d5c17ad0e505c1dc988854003f23cde547

  • SSDEEP

    393216:uve5n24qm5ASHAep8IBz15m5l5ObLC4u54hXl87Vy4QO5X4Lfut6jA66k:uW124n5ASHAedBRkQLC4u54mVy4QO5XO

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 6 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Program crash 2 IoCs
  • Modifies registry class 31 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3164
      • C:\Windows\Explorer.exe
        C:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\Release-x64 (1).zip"
        2⤵
          PID:2472
        • C:\Users\Admin\Desktop\injector.exe
          "C:\Users\Admin\Desktop\injector.exe"
          2⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3452
        • C:\Users\Admin\Desktop\GenshinImpact.exe
          "C:\Users\Admin\Desktop\GenshinImpact.exe"
          2⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetWindowsHookEx
          PID:3068
        • C:\Users\Admin\Desktop\injector.exe
          "C:\Users\Admin\Desktop\injector.exe"
          2⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3376
        • C:\Users\Admin\Desktop\GenshinImpact.exe
          "C:\Users\Admin\Desktop\GenshinImpact.exe"
          2⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:3432
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 3432 -s 492
            3⤵
            • Program crash
            PID:3952
        • C:\Users\Admin\Desktop\injector.exe
          "C:\Users\Admin\Desktop\injector.exe"
          2⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3720
        • C:\Users\Admin\Desktop\GenshinImpact.exe
          "C:\Users\Admin\Desktop\GenshinImpact.exe"
          2⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:1064
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 1064 -s 480
            3⤵
            • Program crash
            PID:4576
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:4632
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -pss -s 460 -p 3432 -ip 3432
          1⤵
            PID:2056
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -pss -s 528 -p 1064 -ip 1064
            1⤵
              PID:1216

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\Desktop\cfg.ini

              Filesize

              69B

              MD5

              c0b0087fa68d6fea7fbfbe063dd4bc54

              SHA1

              4aa3d30760d1e3cbb59f075b5a005bdbb45464cb

              SHA256

              9afa09fce8e63289512e3204b118665443b2956c2c92dde7cf925044b4ac73c4

              SHA512

              40ae37f6fa48fd3a343bcc6703a47b88d2e4f81fcf816b241c54988ce6f1fd0d6da2e4e15512299c952a6720aed92b7059dcbbde9671a6c8ee0fbb99d866080e

            • C:\Users\Admin\Desktop\cfg.ini

              Filesize

              114B

              MD5

              4168b7fb1245a796014490e08a0056e7

              SHA1

              90e1a1fc1f8170fe6fd580dabaa82b9b11dbc9dc

              SHA256

              c6b78e44b74442294133195e786c26c015ab008952e67fbbd508d387dc575b49

              SHA512

              a93230a90fd07d8ccc718c941d4a31af17a3eefe76713b037411d3ec2c32bddb0d383e78aca6930c410418e8315e0ce16845b44a3086fb5fe5e6cd726edbdb4f

            • C:\Users\Admin\Desktop\cfg.ini

              Filesize

              114B

              MD5

              4168b7fb1245a796014490e08a0056e7

              SHA1

              90e1a1fc1f8170fe6fd580dabaa82b9b11dbc9dc

              SHA256

              c6b78e44b74442294133195e786c26c015ab008952e67fbbd508d387dc575b49

              SHA512

              a93230a90fd07d8ccc718c941d4a31af17a3eefe76713b037411d3ec2c32bddb0d383e78aca6930c410418e8315e0ce16845b44a3086fb5fe5e6cd726edbdb4f

            • C:\Users\Admin\Desktop\cfg.ini

              Filesize

              114B

              MD5

              4168b7fb1245a796014490e08a0056e7

              SHA1

              90e1a1fc1f8170fe6fd580dabaa82b9b11dbc9dc

              SHA256

              c6b78e44b74442294133195e786c26c015ab008952e67fbbd508d387dc575b49

              SHA512

              a93230a90fd07d8ccc718c941d4a31af17a3eefe76713b037411d3ec2c32bddb0d383e78aca6930c410418e8315e0ce16845b44a3086fb5fe5e6cd726edbdb4f

            • C:\Users\Admin\Desktop\cfg.json

              Filesize

              111B

              MD5

              b29152e81b4614945d05f8b30275064a

              SHA1

              4a4101d21c2a16595725da204c3ffd2e10020b4c

              SHA256

              6ec9e31fd72824c942c2995a5f2e1c542d6579c64884ff0c9a335267f54ea461

              SHA512

              a0e8a9c1395a7e0c386990c1c2723055c7ddd83d876b9e4252eb7052e88a5e5c3a7718748f864aa79fdb4a4ea7727b7acf3eef568c68ad4ce41cb840ebd55ff2

            • C:\Users\Admin\Desktop\cfg.json

              Filesize

              109B

              MD5

              7a67ae5841bb83225b0a1997ce21e554

              SHA1

              81b8b2dd989cf5cadef88705ac924b0799a6087d

              SHA256

              4fde99e4ce00f147809c1162bdb3d139a76ae7c3f3d18f07eec3a4c32ace119d

              SHA512

              65d5c639a3e0ad4cc2699efa009590d5e66e63ce274ba5fecba75eb5f4c852f679078881356bf3f700efa73d7edd8cfbbd59c85090c1e71e83949bf01cf4164c

            • memory/1064-150-0x00007FFD2F2A0000-0x00007FFD31B6E000-memory.dmp

              Filesize

              40.8MB

            • memory/1064-155-0x00007FFD2F2A0000-0x00007FFD31B6E000-memory.dmp

              Filesize

              40.8MB

            • memory/3068-135-0x00007FFD36150000-0x00007FFD38A1E000-memory.dmp

              Filesize

              40.8MB

            • memory/3068-137-0x00007FFD36150000-0x00007FFD38A1E000-memory.dmp

              Filesize

              40.8MB

            • memory/3432-141-0x00007FFD2F2A0000-0x00007FFD31B6E000-memory.dmp

              Filesize

              40.8MB

            • memory/3432-146-0x00007FFD2F2A0000-0x00007FFD31B6E000-memory.dmp

              Filesize

              40.8MB