Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07/10/2023, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
238b9edf61d7c17a53ba3e6e83580dd582d6e51dbebc4b15ea7a02f8784ba9a4.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
238b9edf61d7c17a53ba3e6e83580dd582d6e51dbebc4b15ea7a02f8784ba9a4.exe
Resource
win10v2004-20230915-en
General
-
Target
238b9edf61d7c17a53ba3e6e83580dd582d6e51dbebc4b15ea7a02f8784ba9a4.exe
-
Size
6.9MB
-
MD5
29c12f458612cc5bd40a83f1ceab363d
-
SHA1
d860c140ea034a3ed6e7b0856801529b33099818
-
SHA256
238b9edf61d7c17a53ba3e6e83580dd582d6e51dbebc4b15ea7a02f8784ba9a4
-
SHA512
9baa3d02d2c0b7a66c260b9864077ed43a07bb08d0b5f1f6559300ed54df11daa2390fcfc0f23e4bacf479342627118bce22d817d64072fa6a5383f4ca620364
-
SSDEEP
98304:ertEgFmXyPtBkDzOHyaFnZixMgDCTrOOa5YLxmqFFmSzyc0TvI/koZLkYAewwYk9:4tpCyUDraFnaJaLuqatcEI/XZLk8D59
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 238b9edf61d7c17a53ba3e6e83580dd582d6e51dbebc4b15ea7a02f8784ba9a4.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 238b9edf61d7c17a53ba3e6e83580dd582d6e51dbebc4b15ea7a02f8784ba9a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 238b9edf61d7c17a53ba3e6e83580dd582d6e51dbebc4b15ea7a02f8784ba9a4.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 238b9edf61d7c17a53ba3e6e83580dd582d6e51dbebc4b15ea7a02f8784ba9a4.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 238b9edf61d7c17a53ba3e6e83580dd582d6e51dbebc4b15ea7a02f8784ba9a4.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4176 238b9edf61d7c17a53ba3e6e83580dd582d6e51dbebc4b15ea7a02f8784ba9a4.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies registry class 26 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 78003100000000002f571b311100557365727300640009000400efbe874f7748475782202e000000c70500000000010000000000000000003a0000000000ff71760055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 500031000000000047578620100041646d696e003c0009000400efbe2f571b31475786202e0000007de10100000001000000000000000000000000000000ffe82c01410064006d0069006e00000014000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4472 notepad.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2028 explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4176 238b9edf61d7c17a53ba3e6e83580dd582d6e51dbebc4b15ea7a02f8784ba9a4.exe 4176 238b9edf61d7c17a53ba3e6e83580dd582d6e51dbebc4b15ea7a02f8784ba9a4.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2028 explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4176 238b9edf61d7c17a53ba3e6e83580dd582d6e51dbebc4b15ea7a02f8784ba9a4.exe 4176 238b9edf61d7c17a53ba3e6e83580dd582d6e51dbebc4b15ea7a02f8784ba9a4.exe 2028 explorer.exe 2028 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4176 wrote to memory of 2532 4176 238b9edf61d7c17a53ba3e6e83580dd582d6e51dbebc4b15ea7a02f8784ba9a4.exe 87 PID 4176 wrote to memory of 2532 4176 238b9edf61d7c17a53ba3e6e83580dd582d6e51dbebc4b15ea7a02f8784ba9a4.exe 87 PID 2532 wrote to memory of 836 2532 cmd.exe 89 PID 2532 wrote to memory of 836 2532 cmd.exe 89 PID 4176 wrote to memory of 3776 4176 238b9edf61d7c17a53ba3e6e83580dd582d6e51dbebc4b15ea7a02f8784ba9a4.exe 92 PID 4176 wrote to memory of 3776 4176 238b9edf61d7c17a53ba3e6e83580dd582d6e51dbebc4b15ea7a02f8784ba9a4.exe 92 PID 3776 wrote to memory of 4472 3776 cmd.exe 94 PID 3776 wrote to memory of 4472 3776 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\238b9edf61d7c17a53ba3e6e83580dd582d6e51dbebc4b15ea7a02f8784ba9a4.exe"C:\Users\Admin\AppData\Local\Temp\238b9edf61d7c17a53ba3e6e83580dd582d6e51dbebc4b15ea7a02f8784ba9a4.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c explorer/select,C:\Users\Admin\HELanguage.hel2⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\explorer.exeexplorer /select,C:\Users\Admin\HELanguage.hel3⤵PID:836
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start notepad C:\Users\Admin\HELanguage.hel2⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\system32\notepad.exenotepad C:\Users\Admin\HELanguage.hel3⤵
- Opens file in notepad (likely ransom note)
PID:4472
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2028
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD53823c29c8fe18e23a5fae0e3d6b532ed
SHA1d6a6bb56a26f3a7b7a8f894237318b62d5fae432
SHA256a6226bfc3c5765048346a2ca643495269ff8b737a9ccd0b54f3d7e16920a3906
SHA5120fcf14683ecc0d485124f77bb431d1b8344bd3f0d1691ee747964bf3d5c97e48aa146d485d7384c72c776d41aa358835d44381dfe1f00dbbe24405fb0d1aae6d