Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-11-2023 09:13

General

  • Target

    2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe

  • Size

    3.9MB

  • MD5

    252ad3e2fe53a734995ddf9fe46b7d3a

  • SHA1

    127664f7658642655f8560e0c0c5a21e2f0f95ca

  • SHA256

    2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb

  • SHA512

    ef9493ba0c15dde6ee9db9f2c1dc7d70304e7cd46f37d8611be3f0781e27e330bfb46b963bbc30742ecdeb41f5f621eada977b34a9b6a5f591d07333b994ccf3

  • SSDEEP

    98304:K1X29SacJCl3Bw95kLLvE5Qb54Q1CgUi+PSOs0/4lf:K1ySzJk3Bw9YvE+b6s2J0Nf

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Themida packer 12 IoCs

    Detects Themida, an advanced Windows software protection system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe
    "C:\Users\Admin\AppData\Local\Temp\2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Users\Public\Downloads\3D5zv7nl\NssWB1pY.exe
      "C:\Users\Public\Downloads\3D5zv7nl\NssWB1pY.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4564
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo.>c:\xxxx.ini
        3⤵
          PID:1380

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_ir_tu2_temp_0\IRIMG3.JPG

      Filesize

      6KB

      MD5

      e39405e85e09f64ccde0f59392317dd3

      SHA1

      9c76db4b3d8c7972e7995ecfb1e3c47ee94fd14b

      SHA256

      cfd9677e1c0e10b1507f520c4ecd40f68db78154c0d4e6563403d540f3bf829f

      SHA512

      6733f330145b48d23c023c664090f4f240e9bbeb8368b486c8ee8682ec6a930b73275e24075648d1aa7e01db1ec7b7e259286917a006ba9af8fb7cba3439070a

    • C:\Users\Admin\AppData\Local\Temp\_ir_tu2_temp_0\IRIMG4.JPG

      Filesize

      36KB

      MD5

      f6bf82a293b69aa5b47d4e2de305d45a

      SHA1

      4948716616d4bbe68be2b4c5bf95350402d3f96f

      SHA256

      6a9368cdd7b3ff9b590e206c3536569bc45c338966d0059784959f73fe6281e0

      SHA512

      edf0f3ee60a620cf886184c1014f38d0505aac9e3703d61d7074cfb27d6922f80e570d1a3891593606a09f1296a88c8770445761c11c390a99a5341ee56478aa

    • C:\Users\Public\Downloads\3D5zv7nl\Edge.jpg

      Filesize

      358KB

      MD5

      df6d4696238a68f2759155507dde18c3

      SHA1

      478d534b6994a730043461b607b6dd4bb024fc6d

      SHA256

      4c3bf5a864812d7175c4845ca67ae1736f2803428cee564ce4151995bf3b5538

      SHA512

      3b49fa339ef8833684896574d56b220a973d44d3c405dbbda7893ce2763a4a145ec20a29e16cc733439a24403f1ecd220812fab9bb6fc742e77f439a79635d69

    • C:\Users\Public\Downloads\3D5zv7nl\NssWB1pY.dat

      Filesize

      132KB

      MD5

      759bba119e8d292dcaaec9f4fa3899a7

      SHA1

      1a3d9303f061638adec61f11d3009731313eaebd

      SHA256

      1c0c43ca902639a02ce67f0ea4d526a074daef14d46d23c734801c2988b1bd15

      SHA512

      b2ee279afccb5b6029acd58b24d05a11be99227dffa781b878cff142d3cbad74544bd0caa3798794f17564ba60d183cb40aef192f2fd61a4669805873bc6ed3c

    • C:\Users\Public\Downloads\3D5zv7nl\NssWB1pY.exe

      Filesize

      525KB

      MD5

      59b28d897cece1afb2bfd227aa29ecda

      SHA1

      fc2370cecbaa6d5aa6e164f4dd9867f00df15827

      SHA256

      5b3e7582653e6ff9b49962b03aa054962ef1126cb2af14f49ff5db1684dc9e70

      SHA512

      ce1b2443654ccc7a33d20d348ebb3286e6d6e1d8670dc0eb92c1488d1c7cd220b43d205ae54e633381f1a1c3351a7f1df35093c3d7ca3ff0d7c77cad46bdfc2a

    • C:\Users\Public\Downloads\3D5zv7nl\NssWB1pY.exe

      Filesize

      525KB

      MD5

      59b28d897cece1afb2bfd227aa29ecda

      SHA1

      fc2370cecbaa6d5aa6e164f4dd9867f00df15827

      SHA256

      5b3e7582653e6ff9b49962b03aa054962ef1126cb2af14f49ff5db1684dc9e70

      SHA512

      ce1b2443654ccc7a33d20d348ebb3286e6d6e1d8670dc0eb92c1488d1c7cd220b43d205ae54e633381f1a1c3351a7f1df35093c3d7ca3ff0d7c77cad46bdfc2a

    • C:\Users\Public\Downloads\3D5zv7nl\edge.xml

      Filesize

      84KB

      MD5

      24bcaf0cb50a6e93450601763525359e

      SHA1

      6147d2c6e19f0066a3ab25c06de76b5752b669b7

      SHA256

      5852114c4735d09db08b56ca9df16a8d1b9fce2baefc1e01d24e8b667b3abcd8

      SHA512

      d8f697ca8c87acf5222a2c3fcd493df53d0b9965b0e6718ddec0c06e6247e81567732a4327c5bff45579ab8762d7b4000cb052b5dd782d5f8cefe54de901d982

    • memory/1068-8-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp

      Filesize

      9.5MB

    • memory/1068-7-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp

      Filesize

      9.5MB

    • memory/1068-9-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp

      Filesize

      9.5MB

    • memory/1068-10-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp

      Filesize

      9.5MB

    • memory/1068-17-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp

      Filesize

      9.5MB

    • memory/1068-0-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp

      Filesize

      9.5MB

    • memory/1068-6-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp

      Filesize

      9.5MB

    • memory/1068-5-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp

      Filesize

      9.5MB

    • memory/1068-4-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp

      Filesize

      9.5MB

    • memory/1068-3-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp

      Filesize

      9.5MB

    • memory/1068-2-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp

      Filesize

      9.5MB

    • memory/1068-1-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp

      Filesize

      9.5MB

    • memory/4564-18-0x0000000000400000-0x0000000000558000-memory.dmp

      Filesize

      1.3MB

    • memory/4564-42-0x00000000037B0000-0x00000000037C7000-memory.dmp

      Filesize

      92KB

    • memory/4564-45-0x0000000010000000-0x0000000010061000-memory.dmp

      Filesize

      388KB

    • memory/4564-40-0x0000000002C60000-0x0000000002C61000-memory.dmp

      Filesize

      4KB

    • memory/4564-59-0x0000000000400000-0x0000000000558000-memory.dmp

      Filesize

      1.3MB

    • memory/4564-61-0x00000000037B0000-0x00000000037C7000-memory.dmp

      Filesize

      92KB