Analysis

  • max time kernel
    186s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    01/11/2023, 13:02

General

  • Target

    cb4177d5af25492f761ba914ab1a2d5b.exe

  • Size

    484KB

  • MD5

    cb4177d5af25492f761ba914ab1a2d5b

  • SHA1

    533d6af9aefacb4dc542d11f580e74e0094d78cc

  • SHA256

    aa081fdd4b1447f50679f0fa3c2822d35488d566aa4f4b546cb34398a29a9c28

  • SHA512

    eec1b4b638afbe1810a2ef11a25c77b0aabfa2bef29d842a56271d96ca487877dbdef401d2e2e83d255299bbfe0def548634a985814bb8d3e5b3e689c3c1320d

  • SSDEEP

    12288:UDfhQdWP5zZDSakeGD3PPWIAuIejQFXTJxWn:Nd0lEakeGD1hktTJxg

Score
10/10

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Windows security modification 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb4177d5af25492f761ba914ab1a2d5b.exe
    "C:\Users\Admin\AppData\Local\Temp\cb4177d5af25492f761ba914ab1a2d5b.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Windows security modification
    • Maps connected drives based on registry
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2516
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eNHfyKAUV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp70FB.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2868

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmp70FB.tmp

          Filesize

          1KB

          MD5

          d52ca1abb5ef557e4b169706e6fc8269

          SHA1

          bfeda109d9d4d36a51d6b23131233ae6da1c6a0c

          SHA256

          2236670968e8d8901dbba91486acedecdb3036530be28cbaba9443227d670293

          SHA512

          52634b417c2552c14fd33a2a92510f5ea1839f808c4f187417933f10d8dda272fd9adf2e4bb3cd38df072d12773d39a982ddee16b0b97446f3fa6478957ca661

        • memory/2516-10-0x000000006FA70000-0x000000007001B000-memory.dmp

          Filesize

          5.7MB

        • memory/2516-15-0x000000006FA70000-0x000000007001B000-memory.dmp

          Filesize

          5.7MB

        • memory/2516-14-0x0000000002630000-0x0000000002670000-memory.dmp

          Filesize

          256KB

        • memory/2516-13-0x0000000002630000-0x0000000002670000-memory.dmp

          Filesize

          256KB

        • memory/2516-12-0x0000000002630000-0x0000000002670000-memory.dmp

          Filesize

          256KB

        • memory/2516-11-0x000000006FA70000-0x000000007001B000-memory.dmp

          Filesize

          5.7MB

        • memory/2640-3-0x0000000074C00000-0x00000000752EE000-memory.dmp

          Filesize

          6.9MB

        • memory/2640-7-0x0000000000EA0000-0x0000000000EE0000-memory.dmp

          Filesize

          256KB

        • memory/2640-6-0x0000000004630000-0x0000000004690000-memory.dmp

          Filesize

          384KB

        • memory/2640-5-0x0000000000350000-0x0000000000358000-memory.dmp

          Filesize

          32KB

        • memory/2640-4-0x0000000004C80000-0x0000000004CC0000-memory.dmp

          Filesize

          256KB

        • memory/2640-0-0x0000000000EE0000-0x0000000000F5E000-memory.dmp

          Filesize

          504KB

        • memory/2640-2-0x0000000004C80000-0x0000000004CC0000-memory.dmp

          Filesize

          256KB

        • memory/2640-1-0x0000000074C00000-0x00000000752EE000-memory.dmp

          Filesize

          6.9MB