Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17/11/2023, 01:09 UTC

General

  • Target

    Client.exe

  • Size

    156KB

  • MD5

    a0e75a2c85b92f57dacfc23abca49e13

  • SHA1

    7ac5d02431ba56e5409957e08f8ac0fff28dff5c

  • SHA256

    eca3ebb192d70aad680a4c202d6d894c2393f73f52f34e215f970eb280c132ca

  • SHA512

    0931d46dfb89fe09afbf3b61f0b53e8de26a4a6de6db5739e070cae105d5515e2ff9ed731d81c015bc7f0f4a0e0723249edab7f02e7289d267be710fd77982e2

  • SSDEEP

    3072:s2pPQ/UD9czWHsp10bEJrkv8nzDpw6EnERND6a9l3Wb1j+D:s2poMBLo1GEJrkH6EniJUb

Score
9/10

Malware Config

Signatures

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client.exe
    "C:\Users\Admin\AppData\Local\Temp\Client.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of AdjustPrivilegeToken
    PID:2288
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2216

Network

  • flag-us
    DNS
    21.236.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    21.236.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    85.65.42.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    85.65.42.20.in-addr.arpa
    IN PTR
    Response
No results found
  • 8.8.8.8:53
    21.236.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    21.236.111.52.in-addr.arpa

  • 8.8.8.8:53
    85.65.42.20.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    85.65.42.20.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2288-0-0x0000000000CC0000-0x0000000000CF0000-memory.dmp

    Filesize

    192KB

  • memory/2288-1-0x0000000001440000-0x0000000001446000-memory.dmp

    Filesize

    24KB

  • memory/2288-2-0x00007FFC22190000-0x00007FFC22B7C000-memory.dmp

    Filesize

    9.9MB

  • memory/2288-3-0x000000001B980000-0x000000001B990000-memory.dmp

    Filesize

    64KB

  • memory/2288-10-0x00007FFC22190000-0x00007FFC22B7C000-memory.dmp

    Filesize

    9.9MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.