Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2023, 05:31

General

  • Target

    983e55d2655805cc03e4d6c07c5ed678e7acfdbf10885dd8aed7688f717e99db.exe

  • Size

    15.0MB

  • MD5

    f7c11d51149e07908c6865be1e21ee95

  • SHA1

    7d2b9300e4642e7fd4a497284fe7142d517024e6

  • SHA256

    983e55d2655805cc03e4d6c07c5ed678e7acfdbf10885dd8aed7688f717e99db

  • SHA512

    a704677a940a62720eab91aea5c7f513ea3d1e7f1a5cba9c0f15f2ee4e42a75d3fc0d8febd46fc69c1d761e6b662b68be41d569bc7e84fecfd87939489a1a745

  • SSDEEP

    393216:B5ul8B0xAAcdJ28ZYy3tYJYvFp+UqkngHJe5+W4y:a2SeJ/3tn9dg8574y

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 7 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 47 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\983e55d2655805cc03e4d6c07c5ed678e7acfdbf10885dd8aed7688f717e99db.exe
    "C:\Users\Admin\AppData\Local\Temp\983e55d2655805cc03e4d6c07c5ed678e7acfdbf10885dd8aed7688f717e99db.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" c:\rsscript\Ææ¼£mu\.dll /s
      2⤵
        PID:5280
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c c:\rsscript\Ææ¼£mu\zc.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5300
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 c:\rsscript\╞µ╝úmu\dm.dll
          3⤵
          • Loads dropped DLL
          PID:5356

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\69b980B.tmp

      Filesize

      8.4MB

      MD5

      0b645b0e9aa91ab4a61fad2d90fd1603

      SHA1

      45ebc5d699072a0c732af6b0ecb90b441dcea6d1

      SHA256

      f0e6be00554af557a1de13b0ebe3c1b907f6a45fe80799b17e66574a023bb710

      SHA512

      7fc1957fe3c62ef5a42451ba3d3228b8fc7e33bc2d6d2473ffb5ac7608424e1b4ec2a5b2bfe6a838455f2268d96f02e3f15305fc7205b1918a1639014199afee

    • C:\Users\Admin\AppData\Local\Temp\983e55d2655805cc03e4d6c07c5ed678e7acfdbf10885dd8aed7688f717e99db.ini

      Filesize

      191B

      MD5

      948532de4c50e3c4f40681fe30c0a248

      SHA1

      367cfb694fd65dbde9cfc3e2dbe123228e724070

      SHA256

      e3387ee03a01a19d8af036aebf7e38f04226c3bb3240e037fec45439004fd96d

      SHA512

      a9d18ed453bef1888754f243bb8c3b81dc2e94b382bef82360b1e6aefcbb72c99f73067080965e6648993fc33bca81837808b0bf9faac9aaf86d2c7493a74bbd

    • C:\Users\Admin\AppData\Local\Temp\983e55d2655805cc03e4d6c07c5ed678e7acfdbf10885dd8aed7688f717e99db.ini

      Filesize

      141B

      MD5

      6c4e099beefefe8c39a8fc8c76cb0d90

      SHA1

      2fe5123e178ef292a06731f5282479a4f49d69b9

      SHA256

      d8adbfec5508193d5845f846e842ee8bfeef933f9ce024c74156215fc35cb0be

      SHA512

      937601aeabf084ab81c94494c16e295bd343a247265cc13a93e3bf3febf60aef75fe1d67d76ce5b59e6945136dfd2880fd627a57e86c00d8c36e3505a625918b

    • C:\Users\Admin\AppData\Local\Temp\cfgdll.dll

      Filesize

      59KB

      MD5

      929f56b46242fa68a616374a5403689b

      SHA1

      45b4ade1f0cc2bf13e74d9801eee5c7abee3c3b2

      SHA256

      767b2e735693a9455a23b19e7a94643fd6095fa1158cbe22f612d657ebbb670d

      SHA512

      81c69649efff9d320533bcb3256d42c671877e1d48f9df99134c514aa2d888d11ded13b9d3447949881513e376cf4644b41b997cad2a9ffb51f4f45ca3cdc641

    • C:\Users\Admin\AppData\Local\Temp\cfgdll.dll

      Filesize

      59KB

      MD5

      929f56b46242fa68a616374a5403689b

      SHA1

      45b4ade1f0cc2bf13e74d9801eee5c7abee3c3b2

      SHA256

      767b2e735693a9455a23b19e7a94643fd6095fa1158cbe22f612d657ebbb670d

      SHA512

      81c69649efff9d320533bcb3256d42c671877e1d48f9df99134c514aa2d888d11ded13b9d3447949881513e376cf4644b41b997cad2a9ffb51f4f45ca3cdc641

    • C:\Users\Admin\AppData\Local\Temp\cfgdll.dll

      Filesize

      59KB

      MD5

      929f56b46242fa68a616374a5403689b

      SHA1

      45b4ade1f0cc2bf13e74d9801eee5c7abee3c3b2

      SHA256

      767b2e735693a9455a23b19e7a94643fd6095fa1158cbe22f612d657ebbb670d

      SHA512

      81c69649efff9d320533bcb3256d42c671877e1d48f9df99134c514aa2d888d11ded13b9d3447949881513e376cf4644b41b997cad2a9ffb51f4f45ca3cdc641

    • C:\Users\Admin\AppData\Local\Temp\cfgdll.dll

      Filesize

      59KB

      MD5

      929f56b46242fa68a616374a5403689b

      SHA1

      45b4ade1f0cc2bf13e74d9801eee5c7abee3c3b2

      SHA256

      767b2e735693a9455a23b19e7a94643fd6095fa1158cbe22f612d657ebbb670d

      SHA512

      81c69649efff9d320533bcb3256d42c671877e1d48f9df99134c514aa2d888d11ded13b9d3447949881513e376cf4644b41b997cad2a9ffb51f4f45ca3cdc641

    • C:\Users\Admin\AppData\Local\Temp\plugin\FILE.ini

      Filesize

      2KB

      MD5

      092ca9ea4cdd3a4f22852e37b3144f49

      SHA1

      5f0508f4fd0cfc316e754e827c700ce0fadeed2f

      SHA256

      ed42221fdf88d16da80dc6a60ecf2c9c0bd98b9dc86b56f525ca02856c20a7d2

      SHA512

      3bb10b16ece317a235db55531ae3777f98469f305cf8887e2eb2c36cb8af61fbbfe06e89206d22b8f3b1c0fe6a157a2e61858a623941b308e6359a4888f3fde6

    • C:\Users\Admin\AppData\Local\Temp\plugin\File.dll

      Filesize

      40KB

      MD5

      d0f222e0927f3f0e341dca4f47af739f

      SHA1

      eebd84e63c3c7e7779712ead30b93ae2e93e3ed1

      SHA256

      9d86a5dbd2395a345675f02746127eb44d184250fd6e901c0c5876bbe4d2b167

      SHA512

      fa81a0729e92ed05bb8999f22b3c164d27bb8184bab60f1884290b9d15e1e9bae0656b3515a6d2a0d90747869398e159c93fe5aef405810dca2eba4124ad6061

    • C:\Users\Admin\AppData\Local\Temp\plugin\File.dll

      Filesize

      40KB

      MD5

      d0f222e0927f3f0e341dca4f47af739f

      SHA1

      eebd84e63c3c7e7779712ead30b93ae2e93e3ed1

      SHA256

      9d86a5dbd2395a345675f02746127eb44d184250fd6e901c0c5876bbe4d2b167

      SHA512

      fa81a0729e92ed05bb8999f22b3c164d27bb8184bab60f1884290b9d15e1e9bae0656b3515a6d2a0d90747869398e159c93fe5aef405810dca2eba4124ad6061

    • C:\Users\Admin\AppData\Local\Temp\plugin\File.dll

      Filesize

      40KB

      MD5

      d0f222e0927f3f0e341dca4f47af739f

      SHA1

      eebd84e63c3c7e7779712ead30b93ae2e93e3ed1

      SHA256

      9d86a5dbd2395a345675f02746127eb44d184250fd6e901c0c5876bbe4d2b167

      SHA512

      fa81a0729e92ed05bb8999f22b3c164d27bb8184bab60f1884290b9d15e1e9bae0656b3515a6d2a0d90747869398e159c93fe5aef405810dca2eba4124ad6061

    • C:\Users\Admin\AppData\Local\Temp\uservar.ini

      Filesize

      9KB

      MD5

      1baeb116f1397719758de645c68cb8d4

      SHA1

      0340b7c8d4b215a31bd4b9b33b324da1527a3187

      SHA256

      7c1c058d1bb2fb515c70ab9990f476ce6f113788ae34292eb904464c0dfa06bc

      SHA512

      9aa57ba7f30d0d0eaaf32ab75a694bf4d570b9bd866e98c9b255eebdf6c8a9233d325384972e5e0463ec66399a2ec15c69c91aa9f2b59669e790ba715ebd5c9e

    • C:\Users\Admin\AppData\Roaming\mymacro\qdisp.dll

      Filesize

      43KB

      MD5

      76147d3e51b7ab6bd6d930d155309cb1

      SHA1

      9a6460462be25fd7256ad4c5b3e361525fd9a5cd

      SHA256

      b2f9a7263afd971b93bdb0ce93ae55b6b993a2a49dad8b72b284d1292ccb351b

      SHA512

      3adca002bfceb795a91ea9e30613700c9e9e7d1e2290b7b84f02dfa6de2ae1a6878c4bfe0f8566da3cf63dd207ee1516cda5d584ed8b1ec12a3f1d54c4f6b2bf

    • C:\Users\Admin\AppData\Roaming\mymacro\qdisp.dll

      Filesize

      43KB

      MD5

      76147d3e51b7ab6bd6d930d155309cb1

      SHA1

      9a6460462be25fd7256ad4c5b3e361525fd9a5cd

      SHA256

      b2f9a7263afd971b93bdb0ce93ae55b6b993a2a49dad8b72b284d1292ccb351b

      SHA512

      3adca002bfceb795a91ea9e30613700c9e9e7d1e2290b7b84f02dfa6de2ae1a6878c4bfe0f8566da3cf63dd207ee1516cda5d584ed8b1ec12a3f1d54c4f6b2bf

    • C:\Users\Admin\AppData\Roaming\mymacro\qdisp.dll

      Filesize

      43KB

      MD5

      76147d3e51b7ab6bd6d930d155309cb1

      SHA1

      9a6460462be25fd7256ad4c5b3e361525fd9a5cd

      SHA256

      b2f9a7263afd971b93bdb0ce93ae55b6b993a2a49dad8b72b284d1292ccb351b

      SHA512

      3adca002bfceb795a91ea9e30613700c9e9e7d1e2290b7b84f02dfa6de2ae1a6878c4bfe0f8566da3cf63dd207ee1516cda5d584ed8b1ec12a3f1d54c4f6b2bf

    • \??\c:\rsscript\Ææ¼£mu\zc.bat

      Filesize

      34B

      MD5

      5044ae3ba5bc1cf44f970174bdc76d46

      SHA1

      ba78955358fc2e3455a404e7d68514314c1e89f1

      SHA256

      f2062307dbd3c6194e1e7d4d8319dbb77e5389fab276ecb15b70c76bf4a08f13

      SHA512

      1f51b022e54aa130c6ede997a3784da29e7f88805bb1a9b0d525a3c7a6d2ebe8562e323ad878e5398093fcbdd012a99386b647f97edc2ae5deb71c61765abcaa

    • memory/1720-1217-0x0000000000400000-0x0000000001746000-memory.dmp

      Filesize

      19.3MB

    • memory/1720-1238-0x0000000000400000-0x0000000001746000-memory.dmp

      Filesize

      19.3MB

    • memory/1720-0-0x0000000000400000-0x0000000001746000-memory.dmp

      Filesize

      19.3MB

    • memory/1720-33-0x0000000007980000-0x000000000798F000-memory.dmp

      Filesize

      60KB

    • memory/1720-2-0x0000000000400000-0x0000000001746000-memory.dmp

      Filesize

      19.3MB

    • memory/1720-1220-0x0000000000400000-0x0000000001746000-memory.dmp

      Filesize

      19.3MB

    • memory/1720-1-0x00000000778E4000-0x00000000778E6000-memory.dmp

      Filesize

      8KB

    • memory/1720-1227-0x0000000000400000-0x0000000001746000-memory.dmp

      Filesize

      19.3MB

    • memory/1720-1231-0x0000000000400000-0x0000000001746000-memory.dmp

      Filesize

      19.3MB

    • memory/1720-1216-0x0000000000400000-0x0000000001746000-memory.dmp

      Filesize

      19.3MB

    • memory/1720-1242-0x0000000000400000-0x0000000001746000-memory.dmp

      Filesize

      19.3MB

    • memory/1720-1249-0x0000000000400000-0x0000000001746000-memory.dmp

      Filesize

      19.3MB

    • memory/1720-1256-0x0000000000400000-0x0000000001746000-memory.dmp

      Filesize

      19.3MB

    • memory/1720-1260-0x0000000000400000-0x0000000001746000-memory.dmp

      Filesize

      19.3MB

    • memory/1720-1267-0x0000000000400000-0x0000000001746000-memory.dmp

      Filesize

      19.3MB

    • memory/1720-1274-0x0000000000400000-0x0000000001746000-memory.dmp

      Filesize

      19.3MB

    • memory/1720-1278-0x0000000000400000-0x0000000001746000-memory.dmp

      Filesize

      19.3MB

    • memory/1720-1285-0x0000000000400000-0x0000000001746000-memory.dmp

      Filesize

      19.3MB

    • memory/1720-1289-0x0000000000400000-0x0000000001746000-memory.dmp

      Filesize

      19.3MB

    • memory/1720-1296-0x0000000000400000-0x0000000001746000-memory.dmp

      Filesize

      19.3MB