Analysis
-
max time kernel
110s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2023, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
b0011be8c7cd1c9865e1f1ed406197d4.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
b0011be8c7cd1c9865e1f1ed406197d4.exe
Resource
win10v2004-20230621-en
General
-
Target
b0011be8c7cd1c9865e1f1ed406197d4.exe
-
Size
12KB
-
MD5
b0011be8c7cd1c9865e1f1ed406197d4
-
SHA1
ddf1f665023dcdddf23576d4db27e65323482d58
-
SHA256
33e6b8a634ba08facba420eed6f61933570fb26e59fdba5a52603148c31e8792
-
SHA512
6daddf405ee371d2e3e89972003d7c317cbc8b09e8231103eb5afcbc2b30dc47e8eff197be7553ce0c68727ae067f2f5d95a57b950725129808a5428fb7adb49
-
SSDEEP
192:VqwFkb7H0rKTW2eOF93JceyCxk6XY5V87W1tf8UoupfJf6myRRW3ZDkmiPmiz10:BUTcOF7cDUk6XYSswunHhITG
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions b0011be8c7cd1c9865e1f1ed406197d4.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions svchost.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools b0011be8c7cd1c9865e1f1ed406197d4.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools svchost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b0011be8c7cd1c9865e1f1ed406197d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b0011be8c7cd1c9865e1f1ed406197d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-922299981-3641064733-3870770889-1000\Control Panel\International\Geo\Nation b0011be8c7cd1c9865e1f1ed406197d4.exe -
Executes dropped EXE 1 IoCs
pid Process 1356 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-922299981-3641064733-3870770889-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" b0011be8c7cd1c9865e1f1ed406197d4.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b0011be8c7cd1c9865e1f1ed406197d4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 b0011be8c7cd1c9865e1f1ed406197d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4456 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1716 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe Token: SeDebugPrivilege 1356 svchost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2120 wrote to memory of 3248 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 89 PID 2120 wrote to memory of 3248 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 89 PID 2120 wrote to memory of 4020 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 91 PID 2120 wrote to memory of 4020 2120 b0011be8c7cd1c9865e1f1ed406197d4.exe 91 PID 4020 wrote to memory of 1716 4020 cmd.exe 93 PID 4020 wrote to memory of 1716 4020 cmd.exe 93 PID 3248 wrote to memory of 4456 3248 cmd.exe 94 PID 3248 wrote to memory of 4456 3248 cmd.exe 94 PID 4020 wrote to memory of 1356 4020 cmd.exe 95 PID 4020 wrote to memory of 1356 4020 cmd.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0011be8c7cd1c9865e1f1ed406197d4.exe"C:\Users\Admin\AppData\Local\Temp\b0011be8c7cd1c9865e1f1ed406197d4.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:4456
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA6E3.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1716
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5ca7c9783d868e474752f254b14c8a4f6
SHA180f51761d3025b57e2213af6bcd3773cdbb261e3
SHA256027d229ca43b48bd3d49240b2796fcede14f507ce0ef432495e584cd81612e29
SHA512ef33f6db8ff35a96cea0caed2131e6afe80b941e6d9d40937c5d4dc4d56f99e0734da8d91dddb7e5d974698daa01df42720ace6903508e4b4ead2942931b4657
-
Filesize
12KB
MD5b0011be8c7cd1c9865e1f1ed406197d4
SHA1ddf1f665023dcdddf23576d4db27e65323482d58
SHA25633e6b8a634ba08facba420eed6f61933570fb26e59fdba5a52603148c31e8792
SHA5126daddf405ee371d2e3e89972003d7c317cbc8b09e8231103eb5afcbc2b30dc47e8eff197be7553ce0c68727ae067f2f5d95a57b950725129808a5428fb7adb49
-
Filesize
12KB
MD5b0011be8c7cd1c9865e1f1ed406197d4
SHA1ddf1f665023dcdddf23576d4db27e65323482d58
SHA25633e6b8a634ba08facba420eed6f61933570fb26e59fdba5a52603148c31e8792
SHA5126daddf405ee371d2e3e89972003d7c317cbc8b09e8231103eb5afcbc2b30dc47e8eff197be7553ce0c68727ae067f2f5d95a57b950725129808a5428fb7adb49