Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
04-07-2023 14:59
Static task
static1
Behavioral task
behavioral1
Sample
Malicious77c1933c4311390d.exe
Resource
win7-20230703-en
General
-
Target
Malicious77c1933c4311390d.exe
-
Size
68KB
-
MD5
c0549318d1ebd8400dffafb37839126e
-
SHA1
95e2529d80809a529ed1bc67d7e4a20a4cc74b88
-
SHA256
77c1933c4311390d9131d1d962138379902158c4cb9a40dd1458ba53565b28f9
-
SHA512
61021ea63df51a89b2a1c6c2de62491639cccac322395e402fce3cf8da2c83dc04a9b5a6072ed5925baa9586d4deab51d627e036174bd3790eff9f434a8d48d0
-
SSDEEP
1536:cCTKEPvB2z1qeFU6IOOUMM513zIjGWvhqooGBO3FZ8BbiUeJ:hMBN+MTzKzvghKBbYJ
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions Malicious77c1933c4311390d.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools Malicious77c1933c4311390d.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Malicious77c1933c4311390d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Malicious77c1933c4311390d.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Malicious77c1933c4311390d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Malicious77c1933c4311390d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 864 systeminfo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2200 Malicious77c1933c4311390d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2208 2200 Malicious77c1933c4311390d.exe 30 PID 2200 wrote to memory of 2208 2200 Malicious77c1933c4311390d.exe 30 PID 2200 wrote to memory of 2208 2200 Malicious77c1933c4311390d.exe 30 PID 2200 wrote to memory of 2208 2200 Malicious77c1933c4311390d.exe 30 PID 2208 wrote to memory of 864 2208 cmd.exe 32 PID 2208 wrote to memory of 864 2208 cmd.exe 32 PID 2208 wrote to memory of 864 2208 cmd.exe 32 PID 2208 wrote to memory of 864 2208 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Malicious77c1933c4311390d.exe"C:\Users\Admin\AppData\Local\Temp\Malicious77c1933c4311390d.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C systeminfo > C:\Users\Admin\AppData\Local\DontForgetIt\systeminfo.txt2⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:864
-
-