Analysis
-
max time kernel
163s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
19-11-2023 03:58
Behavioral task
behavioral1
Sample
96c61a0946342b2914ca29dd0d71f30a3a6fea23b8cad73f8ecf664a068a49e4.exe
Resource
win7-20231023-en
General
-
Target
96c61a0946342b2914ca29dd0d71f30a3a6fea23b8cad73f8ecf664a068a49e4.exe
-
Size
3.9MB
-
MD5
75a37a0a4144f09d9c356a521ed2a0c7
-
SHA1
bd60e11bce93ee9eab4fc1e311bb3808c87ed32c
-
SHA256
96c61a0946342b2914ca29dd0d71f30a3a6fea23b8cad73f8ecf664a068a49e4
-
SHA512
27f071d7f939e533cc0e07be5b9be062f98049c83bf955708bd4c6de912617a50b4a6b2fda5fc937ed1aeee7966201e036d74b81ab1747bb36d0bfcc3d78d34b
-
SSDEEP
98304:K1X29SacJCl3Bw95kLLvE5Qb54Q1CgUi+ySOs0q4R:K1ySzJk3Bw9YvE+b6s240c
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" DqzDk6ew.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 96c61a0946342b2914ca29dd0d71f30a3a6fea23b8cad73f8ecf664a068a49e4.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 96c61a0946342b2914ca29dd0d71f30a3a6fea23b8cad73f8ecf664a068a49e4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 96c61a0946342b2914ca29dd0d71f30a3a6fea23b8cad73f8ecf664a068a49e4.exe -
Executes dropped EXE 1 IoCs
pid Process 1668 DqzDk6ew.exe -
resource yara_rule behavioral1/memory/2256-0-0x000000013F8B0000-0x0000000140229000-memory.dmp themida behavioral1/memory/2256-1-0x000000013F8B0000-0x0000000140229000-memory.dmp themida behavioral1/memory/2256-2-0x000000013F8B0000-0x0000000140229000-memory.dmp themida behavioral1/memory/2256-3-0x000000013F8B0000-0x0000000140229000-memory.dmp themida behavioral1/memory/2256-4-0x000000013F8B0000-0x0000000140229000-memory.dmp themida behavioral1/memory/2256-5-0x000000013F8B0000-0x0000000140229000-memory.dmp themida behavioral1/memory/2256-6-0x000000013F8B0000-0x0000000140229000-memory.dmp themida behavioral1/memory/2256-7-0x000000013F8B0000-0x0000000140229000-memory.dmp themida behavioral1/memory/2256-8-0x000000013F8B0000-0x0000000140229000-memory.dmp themida behavioral1/memory/2256-9-0x000000013F8B0000-0x0000000140229000-memory.dmp themida behavioral1/memory/2256-10-0x000000013F8B0000-0x0000000140229000-memory.dmp themida behavioral1/memory/2256-18-0x000000013F8B0000-0x0000000140229000-memory.dmp themida -
resource yara_rule behavioral1/files/0x002e000000014b92-17.dat upx behavioral1/memory/1668-20-0x0000000000400000-0x0000000000558000-memory.dmp upx behavioral1/files/0x002e000000014b92-50.dat upx behavioral1/memory/1668-61-0x0000000000400000-0x0000000000558000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 96c61a0946342b2914ca29dd0d71f30a3a6fea23b8cad73f8ecf664a068a49e4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2256 96c61a0946342b2914ca29dd0d71f30a3a6fea23b8cad73f8ecf664a068a49e4.exe 2256 96c61a0946342b2914ca29dd0d71f30a3a6fea23b8cad73f8ecf664a068a49e4.exe 2256 96c61a0946342b2914ca29dd0d71f30a3a6fea23b8cad73f8ecf664a068a49e4.exe 2256 96c61a0946342b2914ca29dd0d71f30a3a6fea23b8cad73f8ecf664a068a49e4.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1668 DqzDk6ew.exe 1668 DqzDk6ew.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1668 2256 96c61a0946342b2914ca29dd0d71f30a3a6fea23b8cad73f8ecf664a068a49e4.exe 27 PID 2256 wrote to memory of 1668 2256 96c61a0946342b2914ca29dd0d71f30a3a6fea23b8cad73f8ecf664a068a49e4.exe 27 PID 2256 wrote to memory of 1668 2256 96c61a0946342b2914ca29dd0d71f30a3a6fea23b8cad73f8ecf664a068a49e4.exe 27 PID 2256 wrote to memory of 1668 2256 96c61a0946342b2914ca29dd0d71f30a3a6fea23b8cad73f8ecf664a068a49e4.exe 27 PID 2256 wrote to memory of 1668 2256 96c61a0946342b2914ca29dd0d71f30a3a6fea23b8cad73f8ecf664a068a49e4.exe 27 PID 2256 wrote to memory of 1668 2256 96c61a0946342b2914ca29dd0d71f30a3a6fea23b8cad73f8ecf664a068a49e4.exe 27 PID 2256 wrote to memory of 1668 2256 96c61a0946342b2914ca29dd0d71f30a3a6fea23b8cad73f8ecf664a068a49e4.exe 27 PID 1668 wrote to memory of 3048 1668 DqzDk6ew.exe 30 PID 1668 wrote to memory of 3048 1668 DqzDk6ew.exe 30 PID 1668 wrote to memory of 3048 1668 DqzDk6ew.exe 30 PID 1668 wrote to memory of 3048 1668 DqzDk6ew.exe 30 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" DqzDk6ew.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96c61a0946342b2914ca29dd0d71f30a3a6fea23b8cad73f8ecf664a068a49e4.exe"C:\Users\Admin\AppData\Local\Temp\96c61a0946342b2914ca29dd0d71f30a3a6fea23b8cad73f8ecf664a068a49e4.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Public\Downloads\vsqKPA3O\DqzDk6ew.exe"C:\Users\Public\Downloads\vsqKPA3O\DqzDk6ew.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1668 -
C:\Windows\SysWOW64\cmd.execmd /c echo.>c:\xxxx.ini3⤵PID:3048
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5e39405e85e09f64ccde0f59392317dd3
SHA19c76db4b3d8c7972e7995ecfb1e3c47ee94fd14b
SHA256cfd9677e1c0e10b1507f520c4ecd40f68db78154c0d4e6563403d540f3bf829f
SHA5126733f330145b48d23c023c664090f4f240e9bbeb8368b486c8ee8682ec6a930b73275e24075648d1aa7e01db1ec7b7e259286917a006ba9af8fb7cba3439070a
-
Filesize
36KB
MD5f6bf82a293b69aa5b47d4e2de305d45a
SHA14948716616d4bbe68be2b4c5bf95350402d3f96f
SHA2566a9368cdd7b3ff9b590e206c3536569bc45c338966d0059784959f73fe6281e0
SHA512edf0f3ee60a620cf886184c1014f38d0505aac9e3703d61d7074cfb27d6922f80e570d1a3891593606a09f1296a88c8770445761c11c390a99a5341ee56478aa
-
Filesize
132KB
MD5e106b7fd4c3d48bb868b798c2c76d7f2
SHA16b3a7cc1f47429a683b9321db1cc165046d3cfb6
SHA25603d8f1d778be79c3cd4476b1cc8c657c6d95bc684006ee4c1531d451385b40af
SHA51253a58280024bba85f40e1e6dbe5663aff5b78006a9ed0a8e7d0b7a78c31dcb1512a7dbe8a3cc9191fea7576795e66b8af0f58f11e9c52ebbdc1085a308fe2570
-
Filesize
525KB
MD5a0ef30abe1f03fc300ebb0e318a49901
SHA1f8407e194804c1dae186dbf2d84faeea610adec3
SHA256910ac6be0ab337b7893fa35cd526de1f55c6813a4d559cd4a82e043d66ab3636
SHA51283bcf6f493fee0de979d9ba42a5961f7b04f10aa6828f757cdd752c84de19c09c02ae9b4457a6cd1aa9e4bfcb314b246936bbca0464704bcab7a27dc8a3a60d2
-
Filesize
525KB
MD5a0ef30abe1f03fc300ebb0e318a49901
SHA1f8407e194804c1dae186dbf2d84faeea610adec3
SHA256910ac6be0ab337b7893fa35cd526de1f55c6813a4d559cd4a82e043d66ab3636
SHA51283bcf6f493fee0de979d9ba42a5961f7b04f10aa6828f757cdd752c84de19c09c02ae9b4457a6cd1aa9e4bfcb314b246936bbca0464704bcab7a27dc8a3a60d2
-
Filesize
358KB
MD57ff7e6fc3e8fa734a34d444104e053a0
SHA13ff8c544ad1c952a0259cadf048bb64729c70f38
SHA25665989df141eb5a8093642903d777b57ff5ce108679f722d7687f09b4e5eda1c1
SHA512bba2a53ae8e92b656b5dcb335d9bca0b297aa6469c9d79f027a405d0b0cb031fb1d5488b82aefd91dcc8b8767ff3f8a3e6fd372f58bf03b06f2b6ee2acac9265
-
Filesize
84KB
MD524bcaf0cb50a6e93450601763525359e
SHA16147d2c6e19f0066a3ab25c06de76b5752b669b7
SHA2565852114c4735d09db08b56ca9df16a8d1b9fce2baefc1e01d24e8b667b3abcd8
SHA512d8f697ca8c87acf5222a2c3fcd493df53d0b9965b0e6718ddec0c06e6247e81567732a4327c5bff45579ab8762d7b4000cb052b5dd782d5f8cefe54de901d982