Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-10-2023 09:31

General

  • Target

    53dcd0cf7477087f4e823682957b82122db51cfce93f8b2f5d7fda6338283206.exe

  • Size

    11.7MB

  • MD5

    a9a79898b6adeffd346ec7ccbc49fa85

  • SHA1

    8c55cb89cc7996d46e06c6261d27ed7a82507085

  • SHA256

    53dcd0cf7477087f4e823682957b82122db51cfce93f8b2f5d7fda6338283206

  • SHA512

    6e1d9349e3f85f064255b1dddd65adfe7f108dd527d3e93230c498d510ce30a15cf73565da32d8a44d48f24d939f0ed1b32f408f13b9e188a1bdc21e75cd7366

  • SSDEEP

    196608:DO1aT9/ah5LInZHOYNUqA0g6X28dNgovTQ0J7AdCIetOl27NEMSisx:q1Oagxg63dCqNT50o+fisx

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 36 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 29 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53dcd0cf7477087f4e823682957b82122db51cfce93f8b2f5d7fda6338283206.exe
    "C:\Users\Admin\AppData\Local\Temp\53dcd0cf7477087f4e823682957b82122db51cfce93f8b2f5d7fda6338283206.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Users\Admin\AppData\Roaming\MyMacro\binding.exe
      C:\Users\Admin\AppData\Roaming\MyMacro\binding.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1028
    • C:\Windows\SysWOW64\PING.EXE
      "C:\Windows\System32\PING.EXE" www.baidu.com -n 2
      2⤵
      • Runs ping.exe
      PID:228
    • C:\Users\Admin\AppData\Roaming\MyMacro\Runner.exe
      --host_id 3 --verify_key zrt23A3bVgkx --product "C:\Users\Admin\AppData\Local\Temp\53dcd0cf7477087f4e823682957b82122db51cfce93f8b2f5d7fda6338283206.exe" --runner_md5 Rjg4N0Q0MjY2MkI0RUM3RTU3N0VBOTI0RUVDOEM3ODcA --version 2014.06.19549
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1848
    • C:\Windows\SysWOW64\PING.EXE
      "C:\Windows\System32\PING.EXE" www.baidu.com -n 2
      2⤵
      • Runs ping.exe
      PID:3100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\boost_interprocess_qm\Md__J_BeU04h

    Filesize

    256KB

    MD5

    98176fb770fb3fcd1ad9835ae29cb38d

    SHA1

    2f9b5a706e5f00a8d75bd991dbf2e8754e12cf2c

    SHA256

    73200688e70f03cf01975b056f9942ab7d7b35ba71c9cdfd3a9f43b9cf96061c

    SHA512

    1d7b5fa9945ca43fe47c0e695a100e49566b1181a6fb727529232cabcc656d7ccab15a97118a47c117c64a71040b62d6bcc0df5902ac4afb8789b56822cc91b9

  • C:\ProgramData\boost_interprocess_qm\S6e_2JSLTUsF

    Filesize

    3.3MB

    MD5

    e7e2e14e11f486f077ac466f4b76bbd9

    SHA1

    b8b0e7974ffcf8d43989a2cde23bddbd365c1e09

    SHA256

    4a1e9a57527c045cc41965bca9bdcb472a9e0ef691420d3c298b0a4df297bffc

    SHA512

    789958dafb948bbf0583031622fb19234637b1d77da5088cf7f9a38a052cda4d86204ecbec9b7322348a8ced9e103222c9d121eb7a03f1ca2040a81ac39326d2

  • C:\ProgramData\boost_interprocess_qm\m9xQmbfbOn9

    Filesize

    258B

    MD5

    f071207eef75b019bf8cec44be422c06

    SHA1

    4c7284926331c3313aca6a1671cb2fd46e42eb4b

    SHA256

    fba4239347d55baf9619b2b5e49a1b5cf0547b3a5f63e9b484ad2d597d5ae0dd

    SHA512

    ad046b1192bd42ba36d5a4e8e40c4f33c9156b7ba6b5ce7d6dcb202a7019f6dfe1cbaf0d1141d6c0aeb1680886859ac2db981cc47fb0cac9b02d6aaeb10e795d

  • C:\ProgramData\boost_interprocess_qm\m9xQmbfbOn90

    Filesize

    256KB

    MD5

    71d454d3a478a4d437daf355cbe9b672

    SHA1

    8463f6579dec9041f7ce027b77890c753f4ad49d

    SHA256

    045617a575a0867622ab631e922f815dab758baeb6395760a231682c46dd4c1a

    SHA512

    f7af36e9221f597baacf441732d212dff032d6aa3bb339f4ff727c33cd2c35b9796135b36d4d7e2151e4948d4a20ec2342694cb35b4b66436f1be0e116fc05ef

  • C:\Users\Admin\AppData\Local\Temp\QMLog\20231007.log

    Filesize

    324B

    MD5

    bb112aeae56c99e964c0aa62bad41344

    SHA1

    918a50c8e5a791b4b189701fb2352d6e040d212f

    SHA256

    d1a72973cedbae24ebbf4b5f46a0dc851c9c7958d74db4eafa3e8188eba0867b

    SHA512

    8d9d8a32f7a3165292d269e2b0b21ee501866e8926fb3f140780e69a8738f60c7b8fba15dcdcceeccf7fc28f9c61dcb45f558121f286a5d225e6a9cddf2c6b5b

  • C:\Users\Admin\AppData\Local\Temp\ad-mymacro9.xml.tmp

    Filesize

    3KB

    MD5

    6a004b4196400a627b5b6248a2a2dcba

    SHA1

    fa9a555e83a4c3a73e07a728ec92827f55fbcf02

    SHA256

    9cd3e3f97866082f8edfed25d56b40786c2809f264c4f8b10c022403e7f0f101

    SHA512

    1b5cea41dce0742e4ba7a7f3c4bef3eefc92c63d267a306e4098c68b768723abc0f0eace4a486ff3f4b1bb8a74279dd04e9c2a48df9a20125c21209e3d205624

  • C:\Users\Admin\AppData\Local\Temp\mac270B.tmp

    Filesize

    330B

    MD5

    da54223333f3aee668a9333a9080a0a4

    SHA1

    48eb42f9797fbdfd4e444081ee8c432c841c8fe1

    SHA256

    041a4044f7b18c76d7fcff6cf11b72ad3f6128067c225d67ce6b7ffe08997c4e

    SHA512

    29816c98c665d697db0ce7c1662306fd6c9c31b2d910c715655d3981fccb1daa7a56c9e67449b8ed0afe08bad86362925de0203f0f90d2e20017485128a15dcb

  • C:\Users\Admin\AppData\Roaming\MyMacro\Runner.exe

    Filesize

    7.2MB

    MD5

    6293dc8adef748b02fb614733007ecd6

    SHA1

    105ee791a7f1a9034d70db76a4fe3765a761f526

    SHA256

    862e7f2a5d41423d31336f87fb405ed04768c92b948270cf7d0bf9c8892a2f79

    SHA512

    7b7d71cadd18b7ecfb70f04629d91637337236f6500b52d7c095c2b97a3380aefb3815c8804a67162c0a2452b0606d7ab27b04270d1c589afe39bda4993f6943

  • C:\Users\Admin\AppData\Roaming\MyMacro\Runner.exe

    Filesize

    7.2MB

    MD5

    6293dc8adef748b02fb614733007ecd6

    SHA1

    105ee791a7f1a9034d70db76a4fe3765a761f526

    SHA256

    862e7f2a5d41423d31336f87fb405ed04768c92b948270cf7d0bf9c8892a2f79

    SHA512

    7b7d71cadd18b7ecfb70f04629d91637337236f6500b52d7c095c2b97a3380aefb3815c8804a67162c0a2452b0606d7ab27b04270d1c589afe39bda4993f6943

  • C:\Users\Admin\AppData\Roaming\MyMacro\Runner.exe

    Filesize

    7.2MB

    MD5

    6293dc8adef748b02fb614733007ecd6

    SHA1

    105ee791a7f1a9034d70db76a4fe3765a761f526

    SHA256

    862e7f2a5d41423d31336f87fb405ed04768c92b948270cf7d0bf9c8892a2f79

    SHA512

    7b7d71cadd18b7ecfb70f04629d91637337236f6500b52d7c095c2b97a3380aefb3815c8804a67162c0a2452b0606d7ab27b04270d1c589afe39bda4993f6943

  • C:\Users\Admin\AppData\Roaming\MyMacro\binding.exe

    Filesize

    1.7MB

    MD5

    6abd36f782e36bcf9e90a3230d6ca97f

    SHA1

    3c3d5760a8db6c66f4c5b8c31cbf2613a8a7d6b9

    SHA256

    13652dae4ec58de8a20da51c7455f34144554b91d25ac1c72bec9cbe361ca752

    SHA512

    05463e3c0028e8e39787465e4529ad22c9c64c2a29701c4673f983b50852573aa3c197c2307fdf58d9ab514cca06f058cc17a8b53d28e76957792be7ac1acce6

  • C:\Users\Admin\AppData\Roaming\MyMacro\binding.exe

    Filesize

    1.7MB

    MD5

    6abd36f782e36bcf9e90a3230d6ca97f

    SHA1

    3c3d5760a8db6c66f4c5b8c31cbf2613a8a7d6b9

    SHA256

    13652dae4ec58de8a20da51c7455f34144554b91d25ac1c72bec9cbe361ca752

    SHA512

    05463e3c0028e8e39787465e4529ad22c9c64c2a29701c4673f983b50852573aa3c197c2307fdf58d9ab514cca06f058cc17a8b53d28e76957792be7ac1acce6

  • C:\Users\Admin\AppData\Roaming\MyMacro\cfgdll.dll

    Filesize

    64KB

    MD5

    e54b7e3ba6c2fd0d79f90e6ba3c019de

    SHA1

    bce9232085090de1b24f017730b7eaf4e7bff68c

    SHA256

    a553d8637dbe0645743eb5f76adf40678cf2fa1e01754f70191e729b7625949c

    SHA512

    fe7777147afea2e90cffa6ba44d7bd81ef036cd3dd6f771a1929811039b7ca4054be598bd5b4df704b5724bb654b1135d53cc617355ff2d3d70708560f549b75

  • C:\Users\Admin\AppData\Roaming\MyMacro\qdisp.dll

    Filesize

    317KB

    MD5

    0c6fe138b1ea6a26dead585b6128bdab

    SHA1

    20d3f819698b12f36fd1f3e63bcd5621b574fd47

    SHA256

    372085c07df86bbd6b7588f1859b7fab8440a3ccedf643067779b6b9c6a67d93

    SHA512

    7d494cbaac76bfb8160088adf9fb6f3313ee56d3bb0db9e5c330c185246818d9ef67e45ee5877842572a50145810fe0748eaeb56c2359859dc8f30b80880b0d8

  • C:\Users\Admin\AppData\Roaming\MyMacro\qdisp.dll

    Filesize

    317KB

    MD5

    0c6fe138b1ea6a26dead585b6128bdab

    SHA1

    20d3f819698b12f36fd1f3e63bcd5621b574fd47

    SHA256

    372085c07df86bbd6b7588f1859b7fab8440a3ccedf643067779b6b9c6a67d93

    SHA512

    7d494cbaac76bfb8160088adf9fb6f3313ee56d3bb0db9e5c330c185246818d9ef67e45ee5877842572a50145810fe0748eaeb56c2359859dc8f30b80880b0d8

  • C:\Users\Admin\AppData\Roaming\MyMacro\qdisp.dll

    Filesize

    317KB

    MD5

    0c6fe138b1ea6a26dead585b6128bdab

    SHA1

    20d3f819698b12f36fd1f3e63bcd5621b574fd47

    SHA256

    372085c07df86bbd6b7588f1859b7fab8440a3ccedf643067779b6b9c6a67d93

    SHA512

    7d494cbaac76bfb8160088adf9fb6f3313ee56d3bb0db9e5c330c185246818d9ef67e45ee5877842572a50145810fe0748eaeb56c2359859dc8f30b80880b0d8

  • memory/1364-93-0x00000000000B0000-0x00000000007E6000-memory.dmp

    Filesize

    7.2MB

  • memory/1364-127-0x00000000000B0000-0x00000000007E6000-memory.dmp

    Filesize

    7.2MB

  • memory/1364-131-0x00000000000B0000-0x00000000007E6000-memory.dmp

    Filesize

    7.2MB

  • memory/1364-62-0x00000000000B0000-0x00000000007E6000-memory.dmp

    Filesize

    7.2MB

  • memory/1364-61-0x00000000000B0000-0x00000000007E6000-memory.dmp

    Filesize

    7.2MB

  • memory/1364-1-0x00000000000B0000-0x00000000007E6000-memory.dmp

    Filesize

    7.2MB

  • memory/1364-89-0x00000000000B0000-0x00000000007E6000-memory.dmp

    Filesize

    7.2MB

  • memory/1364-117-0x00000000000B0000-0x00000000007E6000-memory.dmp

    Filesize

    7.2MB

  • memory/1364-0-0x00000000000B0000-0x00000000007E6000-memory.dmp

    Filesize

    7.2MB

  • memory/1364-129-0x00000000000B0000-0x00000000007E6000-memory.dmp

    Filesize

    7.2MB

  • memory/1364-109-0x00000000000B0000-0x00000000007E6000-memory.dmp

    Filesize

    7.2MB

  • memory/1364-125-0x00000000000B0000-0x00000000007E6000-memory.dmp

    Filesize

    7.2MB

  • memory/1364-111-0x00000000000B0000-0x00000000007E6000-memory.dmp

    Filesize

    7.2MB

  • memory/1364-123-0x00000000000B0000-0x00000000007E6000-memory.dmp

    Filesize

    7.2MB

  • memory/1364-113-0x00000000000B0000-0x00000000007E6000-memory.dmp

    Filesize

    7.2MB

  • memory/1364-121-0x00000000000B0000-0x00000000007E6000-memory.dmp

    Filesize

    7.2MB

  • memory/1364-115-0x00000000000B0000-0x00000000007E6000-memory.dmp

    Filesize

    7.2MB

  • memory/1364-119-0x00000000000B0000-0x00000000007E6000-memory.dmp

    Filesize

    7.2MB

  • memory/1848-94-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/1848-118-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/1848-116-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/1848-120-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/1848-114-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/1848-122-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/1848-112-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/1848-124-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/1848-110-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/1848-126-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/1848-95-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/1848-128-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/1848-66-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/1848-130-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/1848-63-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB

  • memory/1848-132-0x0000000000400000-0x0000000000B3E000-memory.dmp

    Filesize

    7.2MB