Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2023 09:13
Behavioral task
behavioral1
Sample
2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe
Resource
win7-20231023-en
General
-
Target
2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe
-
Size
3.9MB
-
MD5
252ad3e2fe53a734995ddf9fe46b7d3a
-
SHA1
127664f7658642655f8560e0c0c5a21e2f0f95ca
-
SHA256
2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb
-
SHA512
ef9493ba0c15dde6ee9db9f2c1dc7d70304e7cd46f37d8611be3f0781e27e330bfb46b963bbc30742ecdeb41f5f621eada977b34a9b6a5f591d07333b994ccf3
-
SSDEEP
98304:K1X29SacJCl3Bw95kLLvE5Qb54Q1CgUi+PSOs0/4lf:K1ySzJk3Bw9YvE+b6s2J0Nf
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" NssWB1pY.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe -
Executes dropped EXE 1 IoCs
pid Process 4564 NssWB1pY.exe -
resource yara_rule behavioral2/memory/1068-0-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp themida behavioral2/memory/1068-1-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp themida behavioral2/memory/1068-2-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp themida behavioral2/memory/1068-3-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp themida behavioral2/memory/1068-4-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp themida behavioral2/memory/1068-5-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp themida behavioral2/memory/1068-6-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp themida behavioral2/memory/1068-7-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp themida behavioral2/memory/1068-8-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp themida behavioral2/memory/1068-9-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp themida behavioral2/memory/1068-10-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp themida behavioral2/memory/1068-17-0x00007FF6443B0000-0x00007FF644D29000-memory.dmp themida -
resource yara_rule behavioral2/memory/4564-18-0x0000000000400000-0x0000000000558000-memory.dmp upx behavioral2/files/0x0008000000022cd8-16.dat upx behavioral2/files/0x0008000000022cd8-54.dat upx behavioral2/memory/4564-59-0x0000000000400000-0x0000000000558000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1068 2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe 1068 2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe 1068 2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe 1068 2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe 1068 2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe 1068 2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe 1068 2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe 1068 2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe 4564 NssWB1pY.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4564 NssWB1pY.exe 4564 NssWB1pY.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1068 wrote to memory of 4564 1068 2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe 96 PID 1068 wrote to memory of 4564 1068 2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe 96 PID 1068 wrote to memory of 4564 1068 2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe 96 PID 4564 wrote to memory of 1380 4564 NssWB1pY.exe 99 PID 4564 wrote to memory of 1380 4564 NssWB1pY.exe 99 PID 4564 wrote to memory of 1380 4564 NssWB1pY.exe 99 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" NssWB1pY.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe"C:\Users\Admin\AppData\Local\Temp\2f12b3d95d478665c110fe873f869260936d7fb81bca871b72f67f3a62f1aaeb.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Public\Downloads\3D5zv7nl\NssWB1pY.exe"C:\Users\Public\Downloads\3D5zv7nl\NssWB1pY.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4564 -
C:\Windows\SysWOW64\cmd.execmd /c echo.>c:\xxxx.ini3⤵PID:1380
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5e39405e85e09f64ccde0f59392317dd3
SHA19c76db4b3d8c7972e7995ecfb1e3c47ee94fd14b
SHA256cfd9677e1c0e10b1507f520c4ecd40f68db78154c0d4e6563403d540f3bf829f
SHA5126733f330145b48d23c023c664090f4f240e9bbeb8368b486c8ee8682ec6a930b73275e24075648d1aa7e01db1ec7b7e259286917a006ba9af8fb7cba3439070a
-
Filesize
36KB
MD5f6bf82a293b69aa5b47d4e2de305d45a
SHA14948716616d4bbe68be2b4c5bf95350402d3f96f
SHA2566a9368cdd7b3ff9b590e206c3536569bc45c338966d0059784959f73fe6281e0
SHA512edf0f3ee60a620cf886184c1014f38d0505aac9e3703d61d7074cfb27d6922f80e570d1a3891593606a09f1296a88c8770445761c11c390a99a5341ee56478aa
-
Filesize
358KB
MD5df6d4696238a68f2759155507dde18c3
SHA1478d534b6994a730043461b607b6dd4bb024fc6d
SHA2564c3bf5a864812d7175c4845ca67ae1736f2803428cee564ce4151995bf3b5538
SHA5123b49fa339ef8833684896574d56b220a973d44d3c405dbbda7893ce2763a4a145ec20a29e16cc733439a24403f1ecd220812fab9bb6fc742e77f439a79635d69
-
Filesize
132KB
MD5759bba119e8d292dcaaec9f4fa3899a7
SHA11a3d9303f061638adec61f11d3009731313eaebd
SHA2561c0c43ca902639a02ce67f0ea4d526a074daef14d46d23c734801c2988b1bd15
SHA512b2ee279afccb5b6029acd58b24d05a11be99227dffa781b878cff142d3cbad74544bd0caa3798794f17564ba60d183cb40aef192f2fd61a4669805873bc6ed3c
-
Filesize
525KB
MD559b28d897cece1afb2bfd227aa29ecda
SHA1fc2370cecbaa6d5aa6e164f4dd9867f00df15827
SHA2565b3e7582653e6ff9b49962b03aa054962ef1126cb2af14f49ff5db1684dc9e70
SHA512ce1b2443654ccc7a33d20d348ebb3286e6d6e1d8670dc0eb92c1488d1c7cd220b43d205ae54e633381f1a1c3351a7f1df35093c3d7ca3ff0d7c77cad46bdfc2a
-
Filesize
525KB
MD559b28d897cece1afb2bfd227aa29ecda
SHA1fc2370cecbaa6d5aa6e164f4dd9867f00df15827
SHA2565b3e7582653e6ff9b49962b03aa054962ef1126cb2af14f49ff5db1684dc9e70
SHA512ce1b2443654ccc7a33d20d348ebb3286e6d6e1d8670dc0eb92c1488d1c7cd220b43d205ae54e633381f1a1c3351a7f1df35093c3d7ca3ff0d7c77cad46bdfc2a
-
Filesize
84KB
MD524bcaf0cb50a6e93450601763525359e
SHA16147d2c6e19f0066a3ab25c06de76b5752b669b7
SHA2565852114c4735d09db08b56ca9df16a8d1b9fce2baefc1e01d24e8b667b3abcd8
SHA512d8f697ca8c87acf5222a2c3fcd493df53d0b9965b0e6718ddec0c06e6247e81567732a4327c5bff45579ab8762d7b4000cb052b5dd782d5f8cefe54de901d982