Analysis

  • max time kernel
    142s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2023, 02:30

General

  • Target

    79674ae8e6bcee87ad8395f1cacf96a7.exe

  • Size

    15.0MB

  • MD5

    79674ae8e6bcee87ad8395f1cacf96a7

  • SHA1

    929b0a98269efe5bfe8dff3c429355788903f5fb

  • SHA256

    e9c4e47b26d88a24036a8718f3ebeb0da76e1cf9c340784d7c05fcef45a2fcc7

  • SHA512

    5b93cb0dfadf86c76ce2ade9609161ab5ce1b05795a04868ef61153cd9aa0c92c8aa79cc3b20e4473b49d8941c42ad889d2ef6e56fbf1b6b93cf835d31dff58a

  • SSDEEP

    393216:P6aB8giQFMCylttxx1s4/a4DVx4WIWgy8xPro6sxKbVl2WPp7PEco+:P6y8gNFaDrx1s4ZzIth183Gl2WPpYq

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 15 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 24 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79674ae8e6bcee87ad8395f1cacf96a7.exe
    "C:\Users\Admin\AppData\Local\Temp\79674ae8e6bcee87ad8395f1cacf96a7.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -command Remove-Item 'C:\Users\Admin\AppData\Local\Temp\79674ae8e6bcee87ad8395f1cacf96a7.exe.bak' -force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2780
    • C:\Windows\system32\net.exe
      net stop w32time
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 stop w32time
        3⤵
          PID:2816
      • C:\Windows\system32\w32tm.exe
        w32tm /unregister
        2⤵
          PID:2696
        • C:\Windows\system32\w32tm.exe
          w32tm /register
          2⤵
          • Sets DLL path for service in the registry
          PID:2544
        • C:\Windows\system32\fsutil.exe
          fsutil behavior set disablelastaccess 1
          2⤵
            PID:2432
          • C:\Windows\system32\sc.exe
            sc stop "PcaSvc"
            2⤵
            • Launches sc.exe
            PID:1888
          • C:\Windows\system32\sc.exe
            sc config "PcaSvc" start=disabled
            2⤵
            • Launches sc.exe
            PID:2728
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"
            2⤵
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:760
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell (GWMI Win32_Processor).VirtualizationFirmwareEnabled
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1360
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "$env:firmware_type"
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:292
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "confirm-securebootuefi"
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2072
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 2620 -s 676
            2⤵
              PID:2156

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                  Filesize

                  7KB

                  MD5

                  7a9e65453ca1bbbe80883811efc531bf

                  SHA1

                  89c72758015dfd55e29f323f5018bfcab285e8e0

                  SHA256

                  ddf6cc3bb26d61e2b2a34fe5a95806f2804cf480866f3cfdb0fb57b974350321

                  SHA512

                  32f2e305be6697d6578654d9ba913a55ae20670920d2954cef3e69239632312182448c3c99f6bfbdae94be4172a80a394d9bcc9070ee15843fef1a75419baae8

                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                  Filesize

                  7KB

                  MD5

                  7a9e65453ca1bbbe80883811efc531bf

                  SHA1

                  89c72758015dfd55e29f323f5018bfcab285e8e0

                  SHA256

                  ddf6cc3bb26d61e2b2a34fe5a95806f2804cf480866f3cfdb0fb57b974350321

                  SHA512

                  32f2e305be6697d6578654d9ba913a55ae20670920d2954cef3e69239632312182448c3c99f6bfbdae94be4172a80a394d9bcc9070ee15843fef1a75419baae8

                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UWAO12OQ4AGROCYB4656.temp

                  Filesize

                  7KB

                  MD5

                  7a9e65453ca1bbbe80883811efc531bf

                  SHA1

                  89c72758015dfd55e29f323f5018bfcab285e8e0

                  SHA256

                  ddf6cc3bb26d61e2b2a34fe5a95806f2804cf480866f3cfdb0fb57b974350321

                  SHA512

                  32f2e305be6697d6578654d9ba913a55ae20670920d2954cef3e69239632312182448c3c99f6bfbdae94be4172a80a394d9bcc9070ee15843fef1a75419baae8

                • memory/292-90-0x000007FEF4A80000-0x000007FEF541D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/292-88-0x0000000002A90000-0x0000000002B10000-memory.dmp

                  Filesize

                  512KB

                • memory/292-85-0x000007FEF4A80000-0x000007FEF541D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/292-84-0x0000000002A90000-0x0000000002B10000-memory.dmp

                  Filesize

                  512KB

                • memory/292-72-0x0000000002A90000-0x0000000002B10000-memory.dmp

                  Filesize

                  512KB

                • memory/292-71-0x0000000002A90000-0x0000000002B10000-memory.dmp

                  Filesize

                  512KB

                • memory/292-67-0x000007FEF4A80000-0x000007FEF541D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/760-78-0x00000000029D0000-0x0000000002A50000-memory.dmp

                  Filesize

                  512KB

                • memory/760-46-0x000000001B370000-0x000000001B652000-memory.dmp

                  Filesize

                  2.9MB

                • memory/760-92-0x000007FEF4A80000-0x000007FEF541D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/760-79-0x00000000029D0000-0x0000000002A50000-memory.dmp

                  Filesize

                  512KB

                • memory/760-77-0x00000000029D0000-0x0000000002A50000-memory.dmp

                  Filesize

                  512KB

                • memory/760-74-0x000007FEF4A80000-0x000007FEF541D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/760-53-0x00000000029D0000-0x0000000002A50000-memory.dmp

                  Filesize

                  512KB

                • memory/760-52-0x00000000029D0000-0x0000000002A50000-memory.dmp

                  Filesize

                  512KB

                • memory/760-51-0x00000000029D0000-0x0000000002A50000-memory.dmp

                  Filesize

                  512KB

                • memory/760-50-0x00000000029D0000-0x0000000002A50000-memory.dmp

                  Filesize

                  512KB

                • memory/760-47-0x000007FEF4A80000-0x000007FEF541D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/760-49-0x000007FEF4A80000-0x000007FEF541D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/760-48-0x00000000023A0000-0x00000000023A8000-memory.dmp

                  Filesize

                  32KB

                • memory/1360-82-0x0000000001F40000-0x0000000001FC0000-memory.dmp

                  Filesize

                  512KB

                • memory/1360-80-0x000007FEF4A80000-0x000007FEF541D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/1360-94-0x000007FEF4A80000-0x000007FEF541D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/1360-91-0x0000000001F40000-0x0000000001FC0000-memory.dmp

                  Filesize

                  512KB

                • memory/1360-70-0x0000000001F40000-0x0000000001FC0000-memory.dmp

                  Filesize

                  512KB

                • memory/1360-73-0x0000000001F40000-0x0000000001FC0000-memory.dmp

                  Filesize

                  512KB

                • memory/1360-64-0x000007FEF4A80000-0x000007FEF541D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2072-87-0x00000000023C0000-0x0000000002440000-memory.dmp

                  Filesize

                  512KB

                • memory/2072-81-0x000007FEF4A80000-0x000007FEF541D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2072-83-0x00000000023C0000-0x0000000002440000-memory.dmp

                  Filesize

                  512KB

                • memory/2072-86-0x00000000023C0000-0x0000000002440000-memory.dmp

                  Filesize

                  512KB

                • memory/2072-65-0x000007FEF4A80000-0x000007FEF541D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2072-66-0x00000000023C0000-0x0000000002440000-memory.dmp

                  Filesize

                  512KB

                • memory/2072-75-0x00000000023C0000-0x0000000002440000-memory.dmp

                  Filesize

                  512KB

                • memory/2072-68-0x00000000023C0000-0x0000000002440000-memory.dmp

                  Filesize

                  512KB

                • memory/2072-69-0x00000000023C0000-0x0000000002440000-memory.dmp

                  Filesize

                  512KB

                • memory/2072-89-0x000007FEF4A80000-0x000007FEF541D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2620-3-0x000000013F160000-0x0000000141739000-memory.dmp

                  Filesize

                  37.8MB

                • memory/2620-8-0x000000013F160000-0x0000000141739000-memory.dmp

                  Filesize

                  37.8MB

                • memory/2620-6-0x000000013F160000-0x0000000141739000-memory.dmp

                  Filesize

                  37.8MB

                • memory/2620-7-0x000000013F160000-0x0000000141739000-memory.dmp

                  Filesize

                  37.8MB

                • memory/2620-15-0x0000000076F90000-0x0000000077139000-memory.dmp

                  Filesize

                  1.7MB

                • memory/2620-76-0x000000013F160000-0x0000000141739000-memory.dmp

                  Filesize

                  37.8MB

                • memory/2620-5-0x000000013F160000-0x0000000141739000-memory.dmp

                  Filesize

                  37.8MB

                • memory/2620-0-0x000000013F160000-0x0000000141739000-memory.dmp

                  Filesize

                  37.8MB

                • memory/2620-93-0x000000013F160000-0x0000000141739000-memory.dmp

                  Filesize

                  37.8MB

                • memory/2620-30-0x000000013F160000-0x0000000141739000-memory.dmp

                  Filesize

                  37.8MB

                • memory/2620-9-0x000000013F160000-0x0000000141739000-memory.dmp

                  Filesize

                  37.8MB

                • memory/2620-37-0x000007FFFFF90000-0x000007FFFFFA0000-memory.dmp

                  Filesize

                  64KB

                • memory/2620-1-0x0000000076F90000-0x0000000077139000-memory.dmp

                  Filesize

                  1.7MB

                • memory/2620-4-0x000000013F160000-0x0000000141739000-memory.dmp

                  Filesize

                  37.8MB

                • memory/2620-10-0x000000013F160000-0x0000000141739000-memory.dmp

                  Filesize

                  37.8MB

                • memory/2620-19-0x000000013F160000-0x0000000141739000-memory.dmp

                  Filesize

                  37.8MB

                • memory/2620-23-0x000000013F160000-0x0000000141739000-memory.dmp

                  Filesize

                  37.8MB

                • memory/2620-2-0x000000013F160000-0x0000000141739000-memory.dmp

                  Filesize

                  37.8MB

                • memory/2780-20-0x000007FEF5380000-0x000007FEF5D1D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2780-21-0x0000000002A14000-0x0000000002A17000-memory.dmp

                  Filesize

                  12KB

                • memory/2780-16-0x000000001B270000-0x000000001B552000-memory.dmp

                  Filesize

                  2.9MB

                • memory/2780-17-0x0000000001E50000-0x0000000001E58000-memory.dmp

                  Filesize

                  32KB

                • memory/2780-18-0x000007FEF5380000-0x000007FEF5D1D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2780-22-0x0000000002A1B000-0x0000000002A82000-memory.dmp

                  Filesize

                  412KB