Analysis
-
max time kernel
118s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 06:15
Static task
static1
Behavioral task
behavioral1
Sample
RosePrivateTracker.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
RosePrivateTracker.exe
Resource
win10v2004-20230915-en
General
-
Target
RosePrivateTracker.exe
-
Size
155KB
-
MD5
6afd2e6b7403e88508a33622e0d82764
-
SHA1
12a7b51e919364bca99948ca4a8f409bdd677c96
-
SHA256
72b23359c459b85c2ec141c65e5a4207336b28fb9a75734cd0ac8620988a187c
-
SHA512
022853e97fbfa135cc998d72b55b1edfb308f38a7d1080f9439f945139cfe0b4f257d7e5eb7b6eb6e0b176ff46cbab5839a3e3f354c06671b6976dfe844827c2
-
SSDEEP
3072:1IU2DNYZcRqKO9l7HXcKL20zHXcKL20WVI0lt/6pMR8ALHXcKL202:1IUTZYO9l7Xc0jXc0WTt/JXc0
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions RosePrivateTracker.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools RosePrivateTracker.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RosePrivateTracker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RosePrivateTracker.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum RosePrivateTracker.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 RosePrivateTracker.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2612 2224 WerFault.exe 13 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2224 RosePrivateTracker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2612 2224 RosePrivateTracker.exe 29 PID 2224 wrote to memory of 2612 2224 RosePrivateTracker.exe 29 PID 2224 wrote to memory of 2612 2224 RosePrivateTracker.exe 29 PID 2224 wrote to memory of 2612 2224 RosePrivateTracker.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\RosePrivateTracker.exe"C:\Users\Admin\AppData\Local\Temp\RosePrivateTracker.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 8642⤵
- Program crash
PID:2612
-