Analysis
-
max time kernel
152s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 11:48
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
General
-
Target
tmp.exe
-
Size
5.5MB
-
MD5
a92a908cae30b9b020244bedf61a1dd4
-
SHA1
a45bf660ae267b2c8027327b2b97c61faa88d9ae
-
SHA256
ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
-
SHA512
beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
SSDEEP
98304:pHrMX3ZbN6mocwdMpXYI6A2XwY0o7r5QBa2lAo3WTsKVnd/9lSD/WFIxUBzqHy:1MnZZPocwGpoRRXwY9rb2moBKVd/9lEJ
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
Processes:
tmp.exeO.exeO.exeO.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ tmp.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ O.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ O.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ O.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
O.exetmp.exeO.exeO.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion O.exe -
Executes dropped EXE 3 IoCs
Processes:
O.exeO.exeO.exepid process 2528 O.exe 748 O.exe 1992 O.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 2988 cmd.exe -
Processes:
O.exeO.exetmp.exeO.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA O.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA O.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tmp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA O.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
tmp.exeO.exeO.exeO.exepid process 1768 tmp.exe 2528 O.exe 748 O.exe 1992 O.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2596 timeout.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
tmp.execmd.exeO.exetaskeng.exedescription pid process target process PID 1768 wrote to memory of 2988 1768 tmp.exe cmd.exe PID 1768 wrote to memory of 2988 1768 tmp.exe cmd.exe PID 1768 wrote to memory of 2988 1768 tmp.exe cmd.exe PID 1768 wrote to memory of 2988 1768 tmp.exe cmd.exe PID 2988 wrote to memory of 2596 2988 cmd.exe timeout.exe PID 2988 wrote to memory of 2596 2988 cmd.exe timeout.exe PID 2988 wrote to memory of 2596 2988 cmd.exe timeout.exe PID 2988 wrote to memory of 2596 2988 cmd.exe timeout.exe PID 2988 wrote to memory of 2528 2988 cmd.exe O.exe PID 2988 wrote to memory of 2528 2988 cmd.exe O.exe PID 2988 wrote to memory of 2528 2988 cmd.exe O.exe PID 2988 wrote to memory of 2528 2988 cmd.exe O.exe PID 2988 wrote to memory of 2528 2988 cmd.exe O.exe PID 2988 wrote to memory of 2528 2988 cmd.exe O.exe PID 2988 wrote to memory of 2528 2988 cmd.exe O.exe PID 2528 wrote to memory of 1956 2528 O.exe schtasks.exe PID 2528 wrote to memory of 1956 2528 O.exe schtasks.exe PID 2528 wrote to memory of 1956 2528 O.exe schtasks.exe PID 2528 wrote to memory of 1956 2528 O.exe schtasks.exe PID 2936 wrote to memory of 748 2936 taskeng.exe O.exe PID 2936 wrote to memory of 748 2936 taskeng.exe O.exe PID 2936 wrote to memory of 748 2936 taskeng.exe O.exe PID 2936 wrote to memory of 748 2936 taskeng.exe O.exe PID 2936 wrote to memory of 748 2936 taskeng.exe O.exe PID 2936 wrote to memory of 748 2936 taskeng.exe O.exe PID 2936 wrote to memory of 748 2936 taskeng.exe O.exe PID 2936 wrote to memory of 1992 2936 taskeng.exe O.exe PID 2936 wrote to memory of 1992 2936 taskeng.exe O.exe PID 2936 wrote to memory of 1992 2936 taskeng.exe O.exe PID 2936 wrote to memory of 1992 2936 taskeng.exe O.exe PID 2936 wrote to memory of 1992 2936 taskeng.exe O.exe PID 2936 wrote to memory of 1992 2936 taskeng.exe O.exe PID 2936 wrote to memory of 1992 2936 taskeng.exe O.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\s1d4.0.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2596
-
-
C:\ProgramData\Roaming\O.exe"C:\ProgramData\Roaming\O.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "O" /tr C:\ProgramData\Roaming\O.exe /f4⤵
- Creates scheduled task(s)
PID:1956
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {62DEFC71-2418-4647-8E5D-CE02CB9E77BA} S-1-5-21-607259312-1573743425-2763420908-1000:NGTQGRML\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\ProgramData\Roaming\O.exeC:\ProgramData\Roaming\O.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:748
-
-
C:\ProgramData\Roaming\O.exeC:\ProgramData\Roaming\O.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
Filesize
168B
MD544f5a937b6226d54763a11e0be13c03d
SHA14d4cc6bccf8ebccda41e8f5c877093e9029bc643
SHA2560025cc3cbd9d51ff0a84c81d034e1dea79a38f16c60b72532581c4da6e152c21
SHA5125459438d65a48e810004c0340a3f463cd3b797b7dbaf14a84cd2e6b9bc09d61e3ae90ee141b08545b4a9545eb5810f980f6772f26d1303b243ec8ef7a16ce04b
-
Filesize
168B
MD544f5a937b6226d54763a11e0be13c03d
SHA14d4cc6bccf8ebccda41e8f5c877093e9029bc643
SHA2560025cc3cbd9d51ff0a84c81d034e1dea79a38f16c60b72532581c4da6e152c21
SHA5125459438d65a48e810004c0340a3f463cd3b797b7dbaf14a84cd2e6b9bc09d61e3ae90ee141b08545b4a9545eb5810f980f6772f26d1303b243ec8ef7a16ce04b
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba