Analysis
-
max time kernel
147s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
157c24347067ce05ef4edd0b383e6504a76687941e77f60839ee2f03fabd7e06.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
157c24347067ce05ef4edd0b383e6504a76687941e77f60839ee2f03fabd7e06.exe
Resource
win10v2004-20230915-en
General
-
Target
157c24347067ce05ef4edd0b383e6504a76687941e77f60839ee2f03fabd7e06.exe
-
Size
5.5MB
-
MD5
0a030bb22a2ee00b83c19e43873d18c3
-
SHA1
15316a2dafab73174014eb713664911cd5c72170
-
SHA256
157c24347067ce05ef4edd0b383e6504a76687941e77f60839ee2f03fabd7e06
-
SHA512
675e8ba4d9984d931f09fdd263f2d6a51dc762ed64b05f55dd703dc3c0da8926c879839a07fd1a46745b999c2013fa8969d5aeafcfc3c61d7b74cd0582833e7a
-
SSDEEP
98304:kedtHf9Tll5G68L7+eMSq64Ao0TsK6xmluBCFjGW2x3M/82q/JUsauX3Ys/J:THf+6e+eQ64AoFVgluBCFj1q3k7QPauJ
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ demo.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ UnityCrashHandler32.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion UnityCrashHandler32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion UnityCrashHandler32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion demo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion demo.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation UnityCrashHandler32.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation 157c24347067ce05ef4edd0b383e6504a76687941e77f60839ee2f03fabd7e06.exe -
Executes dropped EXE 3 IoCs
pid Process 4628 lol2.exe 4516 UnityCrashHandler32.exe 3976 demo.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\systeamst = "C:\\Users\\Admin\\Documents\\demo.exe" demo.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA UnityCrashHandler32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA demo.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 UnityCrashHandler32.exe File opened for modification \??\PhysicalDrive0 demo.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4516 UnityCrashHandler32.exe 3976 demo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000_Classes\Local Settings UnityCrashHandler32.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4516 UnityCrashHandler32.exe 4516 UnityCrashHandler32.exe 4516 UnityCrashHandler32.exe 4516 UnityCrashHandler32.exe 4516 UnityCrashHandler32.exe 4516 UnityCrashHandler32.exe 3976 demo.exe 3976 demo.exe 3976 demo.exe 3976 demo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3976 demo.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4516 UnityCrashHandler32.exe 4516 UnityCrashHandler32.exe 3976 demo.exe 3976 demo.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4568 wrote to memory of 4628 4568 157c24347067ce05ef4edd0b383e6504a76687941e77f60839ee2f03fabd7e06.exe 86 PID 4568 wrote to memory of 4628 4568 157c24347067ce05ef4edd0b383e6504a76687941e77f60839ee2f03fabd7e06.exe 86 PID 4568 wrote to memory of 4628 4568 157c24347067ce05ef4edd0b383e6504a76687941e77f60839ee2f03fabd7e06.exe 86 PID 4568 wrote to memory of 4516 4568 157c24347067ce05ef4edd0b383e6504a76687941e77f60839ee2f03fabd7e06.exe 88 PID 4568 wrote to memory of 4516 4568 157c24347067ce05ef4edd0b383e6504a76687941e77f60839ee2f03fabd7e06.exe 88 PID 4568 wrote to memory of 4516 4568 157c24347067ce05ef4edd0b383e6504a76687941e77f60839ee2f03fabd7e06.exe 88 PID 4516 wrote to memory of 3976 4516 UnityCrashHandler32.exe 90 PID 4516 wrote to memory of 3976 4516 UnityCrashHandler32.exe 90 PID 4516 wrote to memory of 3976 4516 UnityCrashHandler32.exe 90 PID 4516 wrote to memory of 3108 4516 UnityCrashHandler32.exe 92 PID 4516 wrote to memory of 3108 4516 UnityCrashHandler32.exe 92 PID 4516 wrote to memory of 3108 4516 UnityCrashHandler32.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\157c24347067ce05ef4edd0b383e6504a76687941e77f60839ee2f03fabd7e06.exe"C:\Users\Admin\AppData\Local\Temp\157c24347067ce05ef4edd0b383e6504a76687941e77f60839ee2f03fabd7e06.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\lol2.exe"C:\Users\Admin\AppData\Local\Temp\lol2.exe"2⤵
- Executes dropped EXE
PID:4628
-
-
C:\Users\Admin\AppData\Local\Temp\UnityCrashHandler32.exe"C:\Users\Admin\AppData\Local\Temp\UnityCrashHandler32.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\Documents\demo.exeC:\Users\Admin\Documents\\demo.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3976
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tem.vbs"3⤵PID:3108
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD57eca5449806f9fc3a7b4d74b441519da
SHA1b73b9632b1867088def32c35feee2b3c9394db58
SHA256192a13659855d8dade914115f527ebb301390b97cfc54046404fb1d7e7bd518c
SHA512ff9c1c9c4d8b7ffa643b3ca6519aea8a9fb9dd54f00ffc5a2dd4a5828460a835dadb8e863b84851ab38383381e441c0227dc9e9f50d57e86aae9177aaa7c2de8
-
Filesize
4.2MB
MD5b5c9ad5ca8df59f15177171027ce391b
SHA1c97a4eebc941c88f47efa0861ba87e6b0dd321d1
SHA256611b008343205504811523449ad3cc5f199b95748ae15ba0ffb04bc5309723a3
SHA512ecefbccc39cf01dd9ee597c7b29da131656e0d3c755ab5fa645fe5f44a12fab4b8bcf7ee6534d726fafc1586ecea6e3de782966300c5f43840ac39117fa02564
-
Filesize
4.2MB
MD5b5c9ad5ca8df59f15177171027ce391b
SHA1c97a4eebc941c88f47efa0861ba87e6b0dd321d1
SHA256611b008343205504811523449ad3cc5f199b95748ae15ba0ffb04bc5309723a3
SHA512ecefbccc39cf01dd9ee597c7b29da131656e0d3c755ab5fa645fe5f44a12fab4b8bcf7ee6534d726fafc1586ecea6e3de782966300c5f43840ac39117fa02564
-
Filesize
4.2MB
MD5b5c9ad5ca8df59f15177171027ce391b
SHA1c97a4eebc941c88f47efa0861ba87e6b0dd321d1
SHA256611b008343205504811523449ad3cc5f199b95748ae15ba0ffb04bc5309723a3
SHA512ecefbccc39cf01dd9ee597c7b29da131656e0d3c755ab5fa645fe5f44a12fab4b8bcf7ee6534d726fafc1586ecea6e3de782966300c5f43840ac39117fa02564
-
Filesize
3.3MB
MD599d1f02a9560e2d05a4856b3c2c10254
SHA173360ca4d283d03a1e5a55c3228bee358069bb91
SHA2568f08954ed8852fb63b32ec1fd47a4564ae7b52e225a8d9f03bd3ced8159a27b6
SHA512ec167980f71b42cb6d6cccd71f8d8ca40a4f438c142940a6efae8d48a79fae8aabf953826235148e561506fb3f1aa8977b6c121f3028d369f941b121923562cb
-
Filesize
3.3MB
MD599d1f02a9560e2d05a4856b3c2c10254
SHA173360ca4d283d03a1e5a55c3228bee358069bb91
SHA2568f08954ed8852fb63b32ec1fd47a4564ae7b52e225a8d9f03bd3ced8159a27b6
SHA512ec167980f71b42cb6d6cccd71f8d8ca40a4f438c142940a6efae8d48a79fae8aabf953826235148e561506fb3f1aa8977b6c121f3028d369f941b121923562cb
-
Filesize
3.3MB
MD599d1f02a9560e2d05a4856b3c2c10254
SHA173360ca4d283d03a1e5a55c3228bee358069bb91
SHA2568f08954ed8852fb63b32ec1fd47a4564ae7b52e225a8d9f03bd3ced8159a27b6
SHA512ec167980f71b42cb6d6cccd71f8d8ca40a4f438c142940a6efae8d48a79fae8aabf953826235148e561506fb3f1aa8977b6c121f3028d369f941b121923562cb
-
Filesize
230B
MD50e7b25c8a64ae042fd94ba296330d347
SHA118e63104d84d4405cbeed1fee4f145196c34f9c4
SHA25648fe6ba982f24d9093290925741a5ac68025882583f2c91953f583dab932aa62
SHA512e07265552443687aaa3edbad42a1daa290c3f3fa81b93378b818defe933acbd0bf110a4ab93f08d37c1d053e64a51b55df4de055fe3dd3917771ade8958da368
-
Filesize
4.2MB
MD5534e8c0df9ec2c7b5eaf6fb9b26cd3cc
SHA101a725d10af5b7bd3f27e409cbf48e5524417a87
SHA256bc1dae6d8807534b35e8b8135a2fa4602e2e17191d16fdafe5891b97d698d961
SHA512c21efeac593022f074f9ec1c36ba55ae6f6bb5023c170209b00c654964c596eeefe561957a5755b5bee2974107cdf6c077a9f09e5ee553f5ea821ac2da961ff4
-
Filesize
4.2MB
MD5534e8c0df9ec2c7b5eaf6fb9b26cd3cc
SHA101a725d10af5b7bd3f27e409cbf48e5524417a87
SHA256bc1dae6d8807534b35e8b8135a2fa4602e2e17191d16fdafe5891b97d698d961
SHA512c21efeac593022f074f9ec1c36ba55ae6f6bb5023c170209b00c654964c596eeefe561957a5755b5bee2974107cdf6c077a9f09e5ee553f5ea821ac2da961ff4