Analysis
-
max time kernel
163s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
369KB
-
MD5
ab8ca5e42346f12449880f6cec4d4cda
-
SHA1
b9a1d7e06f7db0fff80a8fbeafe32f408ab2cc20
-
SHA256
2f0d1740cabc87f0b68605d72189860b48ea5cf9b8b1570346e996626aec288b
-
SHA512
a33cbffe2a2518a482d0d70585f31e8a578762a5b2b064ca164dbec7a049b3acb711b39228e9d0970d0d27b188a665c5720a912648cd38f85b41d537e85e974b
-
SSDEEP
6144:JahOdUVuNLepz+4d3fj7tv+9EoLULd36Ls/0sBnNf4jkc/GcFSIXRr:JigTe+Sr7QKP0KNfYk4FHh
Malware Config
Signatures
-
Enumerates VirtualBox DLL files 2 TTPs 8 IoCs
description ioc Process File opened (read-only) C:\windows\System32\vboxoglpassthroughspu.dll industryaddition.exe File opened (read-only) C:\windows\System32\vboxdisp.dll industryaddition.exe File opened (read-only) C:\windows\System32\vboxmrxnp.dll industryaddition.exe File opened (read-only) C:\windows\System32\vboxogl.dll industryaddition.exe File opened (read-only) C:\windows\System32\vboxoglcrutil.dll industryaddition.exe File opened (read-only) C:\windows\System32\vboxoglerrorspu.dll industryaddition.exe File opened (read-only) C:\windows\System32\vboxoglfeedbackspu.dll industryaddition.exe File opened (read-only) C:\windows\System32\vboxoglarrayspu.dll industryaddition.exe -
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \Registry\Machine\SYSTEM\ControlSet001\Services\VBoxSF industryaddition.exe Key opened \Registry\Machine\SYSTEM\ControlSet001\Services\VBoxVideo industryaddition.exe Key opened \Registry\Machine\SYSTEM\ControlSet001\Services\VBoxGuest industryaddition.exe Key opened \Registry\Machine\SYSTEM\ControlSet001\Services\VBoxMouse industryaddition.exe Key opened \Registry\Machine\SYSTEM\ControlSet001\Services\VBoxService industryaddition.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \Registry\Machine\HARDWARE\ACPI\FADT\VBOX__ industryaddition.exe Key opened \Registry\Machine\HARDWARE\ACPI\RSDT\VBOX__ industryaddition.exe Key opened \Registry\Machine\HARDWARE\ACPI\DSDT\VBOX__ industryaddition.exe -
Looks for VirtualBox drivers on disk 2 TTPs 4 IoCs
description ioc Process File opened (read-only) C:\windows\System32\Drivers\VBoxSF.sys industryaddition.exe File opened (read-only) C:\windows\System32\Drivers\VBoxVideo.sys industryaddition.exe File opened (read-only) C:\windows\System32\Drivers\VBoxGuest.sys industryaddition.exe File opened (read-only) C:\windows\System32\Drivers\VBoxMouse.sys industryaddition.exe -
Executes dropped EXE 3 IoCs
pid Process 3640 industryaddition.exe 5108 industryaddition.exe 4892 industryaddiition.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \Registry\Machine\SOFTWARE\Wine industryaddition.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3640 set thread context of 5108 3640 industryaddition.exe 96 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5108 industryaddition.exe 5108 industryaddition.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3640 industryaddition.exe Token: SeDebugPrivilege 4892 industryaddiition.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2632 wrote to memory of 3640 2632 file.exe 85 PID 2632 wrote to memory of 3640 2632 file.exe 85 PID 3640 wrote to memory of 5108 3640 industryaddition.exe 96 PID 3640 wrote to memory of 5108 3640 industryaddition.exe 96 PID 3640 wrote to memory of 5108 3640 industryaddition.exe 96 PID 3640 wrote to memory of 5108 3640 industryaddition.exe 96 PID 3640 wrote to memory of 5108 3640 industryaddition.exe 96 PID 3640 wrote to memory of 5108 3640 industryaddition.exe 96 PID 3640 wrote to memory of 5108 3640 industryaddition.exe 96 PID 3640 wrote to memory of 5108 3640 industryaddition.exe 96 PID 3640 wrote to memory of 5108 3640 industryaddition.exe 96 PID 3640 wrote to memory of 5108 3640 industryaddition.exe 96 PID 3640 wrote to memory of 5108 3640 industryaddition.exe 96 PID 2632 wrote to memory of 4892 2632 file.exe 97 PID 2632 wrote to memory of 4892 2632 file.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\industryaddition.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\industryaddition.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\industryaddition.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\industryaddition.exe3⤵
- Enumerates VirtualBox DLL files
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox drivers on disk
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
PID:5108
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\industryaddiition.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\industryaddiition.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
429KB
MD545a864cdab976946ebf002944a05f9a2
SHA1a5a7872eba1ce0ebd5c77db55612cd4d14bf426b
SHA2563b940d245ac6702f80cb4ffcddab7d1ceb42482dc715fc66c5c9d1a6de17f8e1
SHA51238118890dd9df14b133b4943fd8673dd2daf4a9e00ab711851efd0400fa3c47fe8328c25954d2bdc9042c954278f758082593670be89a21c6fb436385d4358d9
-
Filesize
429KB
MD545a864cdab976946ebf002944a05f9a2
SHA1a5a7872eba1ce0ebd5c77db55612cd4d14bf426b
SHA2563b940d245ac6702f80cb4ffcddab7d1ceb42482dc715fc66c5c9d1a6de17f8e1
SHA51238118890dd9df14b133b4943fd8673dd2daf4a9e00ab711851efd0400fa3c47fe8328c25954d2bdc9042c954278f758082593670be89a21c6fb436385d4358d9
-
Filesize
429KB
MD592d15d0e639a5573540ebec0ce281efc
SHA19e5c6f39eee4178c4da656cd4e06608a7b750972
SHA2566beb73691415668f0619b6d3fde859d67dcd814a2ad250610d7d4781f2d628f5
SHA512f0eeb135692b3893ec966db3ea141c3c2ca48a00e8e93c8c1890031feecb84aadb1a803a93265d16d88d3c0018b1b92910377d3a69d8bbcadeb1b79d0c93b959
-
Filesize
429KB
MD592d15d0e639a5573540ebec0ce281efc
SHA19e5c6f39eee4178c4da656cd4e06608a7b750972
SHA2566beb73691415668f0619b6d3fde859d67dcd814a2ad250610d7d4781f2d628f5
SHA512f0eeb135692b3893ec966db3ea141c3c2ca48a00e8e93c8c1890031feecb84aadb1a803a93265d16d88d3c0018b1b92910377d3a69d8bbcadeb1b79d0c93b959
-
Filesize
429KB
MD592d15d0e639a5573540ebec0ce281efc
SHA19e5c6f39eee4178c4da656cd4e06608a7b750972
SHA2566beb73691415668f0619b6d3fde859d67dcd814a2ad250610d7d4781f2d628f5
SHA512f0eeb135692b3893ec966db3ea141c3c2ca48a00e8e93c8c1890031feecb84aadb1a803a93265d16d88d3c0018b1b92910377d3a69d8bbcadeb1b79d0c93b959