Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2023, 22:46
Static task
static1
Behavioral task
behavioral1
Sample
84c4OGF1.exe
Resource
win7-20230831-en
General
-
Target
84c4OGF1.exe
-
Size
3.4MB
-
MD5
ee1a1964f97f469e9ede06c68f5b2111
-
SHA1
cc0bea12750522e977d5fce70fb0087f2d10cacc
-
SHA256
83a5e511ea183acb772e4e24277419f5f8d20c3dc5ce11a6438a4913e6789b74
-
SHA512
eecd8982b5ad80b0824ef07185d246aca16528d1c846a04fb2ce46122d85b31330b20630dd6e4a4c7d5f3519e3b21e9cfa90e18a335646734abcf396f9c3bc18
-
SSDEEP
98304:JUwOIEK84WQsykAeYXkAeYUaMImg8C0Qu9JuR21C/yIq/dhl/O4i/TksjdFwvhzh:JUwOIEK84WQsykAeYXkAeYUaMImg8C0j
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WindowsHolographicDevicesDesktop-type3.7.4.1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WindowsHolographicDevicesDesktop-type3.7.4.1.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WindowsHolographicDevicesDesktop-type3.7.4.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WindowsHolographicDevicesDesktop-type3.7.4.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WindowsHolographicDevicesDesktop-type3.7.4.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WindowsHolographicDevicesDesktop-type3.7.4.1.exe -
Executes dropped EXE 2 IoCs
pid Process 1300 WindowsHolographicDevicesDesktop-type3.7.4.1.exe 2992 WindowsHolographicDevicesDesktop-type3.7.4.1.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 708 icacls.exe 3788 icacls.exe 844 icacls.exe -
resource yara_rule behavioral2/files/0x00060000000231df-19.dat upx behavioral2/files/0x00060000000231df-20.dat upx behavioral2/memory/1300-21-0x00007FF6EFAD0000-0x00007FF6EFFEF000-memory.dmp upx behavioral2/memory/1300-24-0x00007FF6EFAD0000-0x00007FF6EFFEF000-memory.dmp upx behavioral2/memory/1300-25-0x00007FF6EFAD0000-0x00007FF6EFFEF000-memory.dmp upx behavioral2/memory/1300-26-0x00007FF6EFAD0000-0x00007FF6EFFEF000-memory.dmp upx behavioral2/memory/1300-27-0x00007FF6EFAD0000-0x00007FF6EFFEF000-memory.dmp upx behavioral2/memory/1300-28-0x00007FF6EFAD0000-0x00007FF6EFFEF000-memory.dmp upx behavioral2/memory/1300-29-0x00007FF6EFAD0000-0x00007FF6EFFEF000-memory.dmp upx behavioral2/files/0x00060000000231df-30.dat upx behavioral2/memory/2992-31-0x00007FF6EFAD0000-0x00007FF6EFFEF000-memory.dmp upx behavioral2/memory/2992-32-0x00007FF6EFAD0000-0x00007FF6EFFEF000-memory.dmp upx behavioral2/memory/2992-33-0x00007FF6EFAD0000-0x00007FF6EFFEF000-memory.dmp upx behavioral2/memory/2992-34-0x00007FF6EFAD0000-0x00007FF6EFFEF000-memory.dmp upx behavioral2/memory/2992-35-0x00007FF6EFAD0000-0x00007FF6EFFEF000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsHolographicDevicesDesktop-type3.7.4.1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsHolographicDevicesDesktop-type3.7.4.1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 924 set thread context of 3084 924 84c4OGF1.exe 87 -
Program crash 1 IoCs
pid pid_target Process procid_target 880 924 WerFault.exe 83 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2116 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 924 wrote to memory of 3084 924 84c4OGF1.exe 87 PID 924 wrote to memory of 3084 924 84c4OGF1.exe 87 PID 924 wrote to memory of 3084 924 84c4OGF1.exe 87 PID 924 wrote to memory of 3084 924 84c4OGF1.exe 87 PID 924 wrote to memory of 3084 924 84c4OGF1.exe 87 PID 3084 wrote to memory of 708 3084 AppLaunch.exe 99 PID 3084 wrote to memory of 708 3084 AppLaunch.exe 99 PID 3084 wrote to memory of 708 3084 AppLaunch.exe 99 PID 3084 wrote to memory of 3788 3084 AppLaunch.exe 101 PID 3084 wrote to memory of 3788 3084 AppLaunch.exe 101 PID 3084 wrote to memory of 3788 3084 AppLaunch.exe 101 PID 3084 wrote to memory of 844 3084 AppLaunch.exe 103 PID 3084 wrote to memory of 844 3084 AppLaunch.exe 103 PID 3084 wrote to memory of 844 3084 AppLaunch.exe 103 PID 3084 wrote to memory of 2116 3084 AppLaunch.exe 105 PID 3084 wrote to memory of 2116 3084 AppLaunch.exe 105 PID 3084 wrote to memory of 2116 3084 AppLaunch.exe 105 PID 3084 wrote to memory of 1300 3084 AppLaunch.exe 107 PID 3084 wrote to memory of 1300 3084 AppLaunch.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\84c4OGF1.exe"C:\Users\Admin\AppData\Local\Temp\84c4OGF1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\WindowsHolographicDevicesDesktop-type3.7.4.1" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:708
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\WindowsHolographicDevicesDesktop-type3.7.4.1" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:3788
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\WindowsHolographicDevicesDesktop-type3.7.4.1" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:844
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "WindowsHolographicDevicesDesktop-type3.7.4.1\WindowsHolographicDevicesDesktop-type3.7.4.1" /TR "C:\ProgramData\WindowsHolographicDevicesDesktop-type3.7.4.1\WindowsHolographicDevicesDesktop-type3.7.4.1.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:2116
-
-
C:\ProgramData\WindowsHolographicDevicesDesktop-type3.7.4.1\WindowsHolographicDevicesDesktop-type3.7.4.1.exe"C:\ProgramData\WindowsHolographicDevicesDesktop-type3.7.4.1\WindowsHolographicDevicesDesktop-type3.7.4.1.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1300
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 924 -s 1602⤵
- Program crash
PID:880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 924 -ip 9241⤵PID:1500
-
C:\ProgramData\WindowsHolographicDevicesDesktop-type3.7.4.1\WindowsHolographicDevicesDesktop-type3.7.4.1.exeC:\ProgramData\WindowsHolographicDevicesDesktop-type3.7.4.1\WindowsHolographicDevicesDesktop-type3.7.4.1.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\WindowsHolographicDevicesDesktop-type3.7.4.1\WindowsHolographicDevicesDesktop-type3.7.4.1.exe
Filesize706.5MB
MD5ccfe0ecb6f290c27c366aa8c823039db
SHA1fc933a1e7e0563bac9680b88ff8aabf28d6e0a4f
SHA256618aeaf84337f824e3f5783bfd46905977ce11ffb69663893a7c4617d8931359
SHA512448dcd644003b4aefc9019dc1e83cebd2739eb632e70792db75ace650949af88df42643c7bf82bfce2cda520df592356feeefe010f6e4f587669f55553b2b63f
-
C:\ProgramData\WindowsHolographicDevicesDesktop-type3.7.4.1\WindowsHolographicDevicesDesktop-type3.7.4.1.exe
Filesize706.5MB
MD5ccfe0ecb6f290c27c366aa8c823039db
SHA1fc933a1e7e0563bac9680b88ff8aabf28d6e0a4f
SHA256618aeaf84337f824e3f5783bfd46905977ce11ffb69663893a7c4617d8931359
SHA512448dcd644003b4aefc9019dc1e83cebd2739eb632e70792db75ace650949af88df42643c7bf82bfce2cda520df592356feeefe010f6e4f587669f55553b2b63f
-
C:\ProgramData\WindowsHolographicDevicesDesktop-type3.7.4.1\WindowsHolographicDevicesDesktop-type3.7.4.1.exe
Filesize493.7MB
MD5a9e1ffba16430da00871fe21802c4a60
SHA166e5ea09d38091dd2adb60300ba0142f9ece8aed
SHA25655e9db98536d12db9c10d5650e030356aa99f1f1ff41d1f10e1679ca3c4142a2
SHA5126f510d42050d1307c4d3e4e9563c78b90b57ef57a2388007c382aacb599d774f9b3432041e789113be5f534ea2edb260ad1a8a18c388ae3e5722d6f152bdbd81