Analysis
-
max time kernel
27s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 04:30
Static task
static1
Behavioral task
behavioral1
Sample
WareHub.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
WareHub.exe
Resource
win10v2004-20230915-en
General
-
Target
WareHub.exe
-
Size
16.7MB
-
MD5
b47bb50e982a506b24f8a8755976a1ab
-
SHA1
def13b8444e0be6aceb80d246a3feff9074570c9
-
SHA256
1b385604d945f9a600f47439e3673452e0b83642423205403d5d638f85d38b18
-
SHA512
bbf6c2ce9dc42856246fe7302e77a172ce2cda8374e7d305ca59f52cc5adaa0855341cd9187a8dd1e050ea7d04e793a1d6ac0eea4f3ce269620f0d6e50ef21a6
-
SSDEEP
393216:Vi3BQT0nxPwpNkyZLW0FLy+0W7r+q/Koz/mYRS/OGJGLShb3cmTX:VkQgnxPE7z++0W7ymKk/mYRSXb3tX
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1968 WareHub.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN WareHub.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4820 sc.exe 4420 sc.exe 4128 sc.exe -
Kills process with taskkill 12 IoCs
pid Process 3708 taskkill.exe 1984 taskkill.exe 4616 taskkill.exe 1072 taskkill.exe 1108 taskkill.exe 4240 taskkill.exe 4220 taskkill.exe 3744 taskkill.exe 2960 taskkill.exe 4272 taskkill.exe 3752 taskkill.exe 1644 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe 1968 WareHub.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1964 1968 WareHub.exe 101 PID 1968 wrote to memory of 1964 1968 WareHub.exe 101 PID 1968 wrote to memory of 2572 1968 WareHub.exe 100 PID 1968 wrote to memory of 2572 1968 WareHub.exe 100 PID 1968 wrote to memory of 792 1968 WareHub.exe 99 PID 1968 wrote to memory of 792 1968 WareHub.exe 99 PID 1968 wrote to memory of 3048 1968 WareHub.exe 98 PID 1968 wrote to memory of 3048 1968 WareHub.exe 98 PID 1968 wrote to memory of 4000 1968 WareHub.exe 97 PID 1968 wrote to memory of 4000 1968 WareHub.exe 97 PID 1968 wrote to memory of 1416 1968 WareHub.exe 96 PID 1968 wrote to memory of 1416 1968 WareHub.exe 96 PID 1968 wrote to memory of 2988 1968 WareHub.exe 88 PID 1968 wrote to memory of 2988 1968 WareHub.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\WareHub.exe"C:\Users\Admin\AppData\Local\Temp\WareHub.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\WareHub.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵PID:2988
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:4760
-
-
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\WareHub.exe" MD53⤵PID:3416
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:3408
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&12⤵PID:1416
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&12⤵PID:4000
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F3⤵
- Kills process with taskkill
PID:4220
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:3048
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:4420
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:792
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
PID:4240
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵PID:2572
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T3⤵
- Kills process with taskkill
PID:2960
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:1964
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- Kills process with taskkill
PID:3744
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:1356
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- Kills process with taskkill
PID:4272
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:3456
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:4128
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:1444
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
PID:1984
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵PID:4940
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T3⤵
- Kills process with taskkill
PID:3708
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&12⤵PID:3900
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&12⤵PID:2264
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F3⤵
- Kills process with taskkill
PID:4616
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&12⤵PID:3080
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&12⤵PID:3760
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F3⤵
- Kills process with taskkill
PID:1108
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:5112
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:4820
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:1912
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
PID:1072
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵PID:5004
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T3⤵
- Kills process with taskkill
PID:3752
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:2544
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- Kills process with taskkill
PID:1644
-
-