Analysis
-
max time kernel
143s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
23/11/2023, 22:27
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231023-en
General
-
Target
tmp.exe
-
Size
5.5MB
-
MD5
7f8632e087ebf8eb9a4638f4da5cbed8
-
SHA1
ab40cb7b418e86ee0bb8ae3d2459bb30dc8af789
-
SHA256
5480a005883fdba87ee7ab7c9e7e10d553811c89837a03825b4a702c0c234e6f
-
SHA512
b385733ff09b89fcae2f8e2f9d6423fc98277122a2ee375afe7a0d4624e15acfb8d4a4f69329dae6ad5a0808cc6b23912bae96ccf89c4f2c5a391cd0109776ea
-
SSDEEP
98304:CgNgqVpbTYVgZoj47MZ5FV0ZIvY4mQj1zvJliBN0FLKhsxNv/jA1MXXgnFtEZHOk:CgNvpbXZ778hsIvY6j1mBIN0MniXitky
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ tmp.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XRJNZC.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XRJNZC.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XRJNZC.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XRJNZC.exe -
Executes dropped EXE 3 IoCs
pid Process 2816 XRJNZC.exe 2424 XRJNZC.exe 2444 XRJNZC.exe -
Loads dropped DLL 1 IoCs
pid Process 2496 cmd.exe -
resource yara_rule behavioral1/memory/2872-0-0x0000000000C20000-0x0000000001A4C000-memory.dmp themida behavioral1/memory/2872-4-0x0000000000C20000-0x0000000001A4C000-memory.dmp themida behavioral1/memory/2872-32-0x0000000000C20000-0x0000000001A4C000-memory.dmp themida behavioral1/memory/2872-36-0x0000000000C20000-0x0000000001A4C000-memory.dmp themida behavioral1/memory/2872-38-0x0000000000C20000-0x0000000001A4C000-memory.dmp themida behavioral1/memory/2872-39-0x0000000000C20000-0x0000000001A4C000-memory.dmp themida behavioral1/memory/2872-40-0x0000000000C20000-0x0000000001A4C000-memory.dmp themida behavioral1/memory/2872-41-0x0000000000C20000-0x0000000001A4C000-memory.dmp themida behavioral1/memory/2872-52-0x0000000000C20000-0x0000000001A4C000-memory.dmp themida behavioral1/files/0x002700000001564d-54.dat themida behavioral1/files/0x002700000001564d-55.dat themida behavioral1/files/0x002700000001564d-56.dat themida behavioral1/memory/2496-57-0x0000000002170000-0x0000000002F9C000-memory.dmp themida behavioral1/memory/2816-58-0x0000000000DE0000-0x0000000001C0C000-memory.dmp themida behavioral1/memory/2816-61-0x0000000000DE0000-0x0000000001C0C000-memory.dmp themida behavioral1/memory/2816-101-0x0000000000DE0000-0x0000000001C0C000-memory.dmp themida behavioral1/files/0x002700000001564d-102.dat themida behavioral1/memory/2424-103-0x0000000000DE0000-0x0000000001C0C000-memory.dmp themida behavioral1/memory/2424-106-0x0000000000DE0000-0x0000000001C0C000-memory.dmp themida behavioral1/memory/2424-146-0x0000000000DE0000-0x0000000001C0C000-memory.dmp themida behavioral1/files/0x002700000001564d-152.dat themida behavioral1/memory/2444-155-0x0000000000DE0000-0x0000000001C0C000-memory.dmp themida behavioral1/memory/2444-195-0x0000000000DE0000-0x0000000001C0C000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XRJNZC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XRJNZC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tmp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XRJNZC.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2872 tmp.exe 2816 XRJNZC.exe 2424 XRJNZC.exe 2444 XRJNZC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2824 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1192 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2872 tmp.exe 2816 XRJNZC.exe 2424 XRJNZC.exe 2444 XRJNZC.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2496 2872 tmp.exe 28 PID 2872 wrote to memory of 2496 2872 tmp.exe 28 PID 2872 wrote to memory of 2496 2872 tmp.exe 28 PID 2872 wrote to memory of 2496 2872 tmp.exe 28 PID 2496 wrote to memory of 1192 2496 cmd.exe 30 PID 2496 wrote to memory of 1192 2496 cmd.exe 30 PID 2496 wrote to memory of 1192 2496 cmd.exe 30 PID 2496 wrote to memory of 1192 2496 cmd.exe 30 PID 2496 wrote to memory of 2816 2496 cmd.exe 31 PID 2496 wrote to memory of 2816 2496 cmd.exe 31 PID 2496 wrote to memory of 2816 2496 cmd.exe 31 PID 2496 wrote to memory of 2816 2496 cmd.exe 31 PID 2816 wrote to memory of 2824 2816 XRJNZC.exe 32 PID 2816 wrote to memory of 2824 2816 XRJNZC.exe 32 PID 2816 wrote to memory of 2824 2816 XRJNZC.exe 32 PID 2816 wrote to memory of 2824 2816 XRJNZC.exe 32 PID 1888 wrote to memory of 2424 1888 taskeng.exe 37 PID 1888 wrote to memory of 2424 1888 taskeng.exe 37 PID 1888 wrote to memory of 2424 1888 taskeng.exe 37 PID 1888 wrote to memory of 2424 1888 taskeng.exe 37 PID 1888 wrote to memory of 2444 1888 taskeng.exe 38 PID 1888 wrote to memory of 2444 1888 taskeng.exe 38 PID 1888 wrote to memory of 2444 1888 taskeng.exe 38 PID 1888 wrote to memory of 2444 1888 taskeng.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\s27s.0.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1192
-
-
C:\ProgramData\pinterests\XRJNZC.exe"C:\ProgramData\pinterests\XRJNZC.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "XRJNZC" /tr C:\ProgramData\pinterests\XRJNZC.exe /f4⤵
- Creates scheduled task(s)
PID:2824
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {F440B908-0AA8-4065-9FAE-BAD8868E152A} S-1-5-21-3618187007-3650799920-3290345941-1000:BPDFUYWR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2424
-
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD57f8632e087ebf8eb9a4638f4da5cbed8
SHA1ab40cb7b418e86ee0bb8ae3d2459bb30dc8af789
SHA2565480a005883fdba87ee7ab7c9e7e10d553811c89837a03825b4a702c0c234e6f
SHA512b385733ff09b89fcae2f8e2f9d6423fc98277122a2ee375afe7a0d4624e15acfb8d4a4f69329dae6ad5a0808cc6b23912bae96ccf89c4f2c5a391cd0109776ea
-
Filesize
5.5MB
MD57f8632e087ebf8eb9a4638f4da5cbed8
SHA1ab40cb7b418e86ee0bb8ae3d2459bb30dc8af789
SHA2565480a005883fdba87ee7ab7c9e7e10d553811c89837a03825b4a702c0c234e6f
SHA512b385733ff09b89fcae2f8e2f9d6423fc98277122a2ee375afe7a0d4624e15acfb8d4a4f69329dae6ad5a0808cc6b23912bae96ccf89c4f2c5a391cd0109776ea
-
Filesize
5.5MB
MD57f8632e087ebf8eb9a4638f4da5cbed8
SHA1ab40cb7b418e86ee0bb8ae3d2459bb30dc8af789
SHA2565480a005883fdba87ee7ab7c9e7e10d553811c89837a03825b4a702c0c234e6f
SHA512b385733ff09b89fcae2f8e2f9d6423fc98277122a2ee375afe7a0d4624e15acfb8d4a4f69329dae6ad5a0808cc6b23912bae96ccf89c4f2c5a391cd0109776ea
-
Filesize
5.5MB
MD57f8632e087ebf8eb9a4638f4da5cbed8
SHA1ab40cb7b418e86ee0bb8ae3d2459bb30dc8af789
SHA2565480a005883fdba87ee7ab7c9e7e10d553811c89837a03825b4a702c0c234e6f
SHA512b385733ff09b89fcae2f8e2f9d6423fc98277122a2ee375afe7a0d4624e15acfb8d4a4f69329dae6ad5a0808cc6b23912bae96ccf89c4f2c5a391cd0109776ea
-
Filesize
176B
MD5a0839764bd5cef32fdd082aa68b654f9
SHA1600f82c9b4ed1d8e435ecbc2006f3d97265fc5bf
SHA25613ad70ef4cca248db7c065be8f64f768d31fba5481cab3f4974fc741e08f9279
SHA512b9f70324622a909ea9f1e967d5a8a22a13bc7d4019fe7bcb9903797aa82dba23b14688e4a4049403f6dace5d62b8ca3c268888861d1d1483df6ee342da2266a6
-
Filesize
176B
MD5a0839764bd5cef32fdd082aa68b654f9
SHA1600f82c9b4ed1d8e435ecbc2006f3d97265fc5bf
SHA25613ad70ef4cca248db7c065be8f64f768d31fba5481cab3f4974fc741e08f9279
SHA512b9f70324622a909ea9f1e967d5a8a22a13bc7d4019fe7bcb9903797aa82dba23b14688e4a4049403f6dace5d62b8ca3c268888861d1d1483df6ee342da2266a6
-
Filesize
5.5MB
MD57f8632e087ebf8eb9a4638f4da5cbed8
SHA1ab40cb7b418e86ee0bb8ae3d2459bb30dc8af789
SHA2565480a005883fdba87ee7ab7c9e7e10d553811c89837a03825b4a702c0c234e6f
SHA512b385733ff09b89fcae2f8e2f9d6423fc98277122a2ee375afe7a0d4624e15acfb8d4a4f69329dae6ad5a0808cc6b23912bae96ccf89c4f2c5a391cd0109776ea