Analysis
-
max time kernel
300s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
27/11/2023, 05:00
Behavioral task
behavioral1
Sample
aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4.exe
Resource
win7-20231020-en
General
-
Target
aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4.exe
-
Size
5.7MB
-
MD5
a6d0999d10c4d3a1aee18d73693a5b13
-
SHA1
298d75d1850f7596991aa739fd73738982792442
-
SHA256
aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4
-
SHA512
f5e1e976f7e7a561081297c293d11c06ae471d90d0df167fc57c581cb4cb6b2b5d31f7a8c413de058e9f924b55a9a44c338c6c054ee0947f87dfd59d6b6c3348
-
SSDEEP
98304:9BALWhkuHRdKG2B746zHzhEgNgqVpbTYVgZoj47MZ5FV0ZIvY4mQj1zvJoBeTPRZ:9mahkuHRl2jzGgNvpbXZ778hsIvY6j1R
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XRJNZC.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XRJNZC.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XRJNZC.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XRJNZC.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XRJNZC.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XRJNZC.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XRJNZC.exe -
Executes dropped EXE 6 IoCs
pid Process 2816 XRJNZC.exe 1016 XRJNZC.exe 1776 XRJNZC.exe 2992 XRJNZC.exe 2976 XRJNZC.exe 1616 XRJNZC.exe -
Loads dropped DLL 1 IoCs
pid Process 2576 cmd.exe -
resource yara_rule behavioral1/memory/2492-0-0x00000000013A0000-0x000000000222F000-memory.dmp themida behavioral1/memory/2492-3-0x00000000013A0000-0x000000000222F000-memory.dmp themida behavioral1/memory/2492-32-0x00000000013A0000-0x000000000222F000-memory.dmp themida behavioral1/memory/2492-36-0x00000000013A0000-0x000000000222F000-memory.dmp themida behavioral1/memory/2492-38-0x00000000013A0000-0x000000000222F000-memory.dmp themida behavioral1/memory/2492-39-0x00000000013A0000-0x000000000222F000-memory.dmp themida behavioral1/memory/2492-40-0x00000000013A0000-0x000000000222F000-memory.dmp themida behavioral1/memory/2492-41-0x00000000013A0000-0x000000000222F000-memory.dmp themida behavioral1/memory/2492-52-0x00000000013A0000-0x000000000222F000-memory.dmp themida behavioral1/files/0x00080000000120ed-55.dat themida behavioral1/files/0x00080000000120ed-54.dat themida behavioral1/files/0x00080000000120ed-56.dat themida behavioral1/memory/2576-57-0x0000000002230000-0x00000000030BF000-memory.dmp themida behavioral1/memory/2816-58-0x0000000000EB0000-0x0000000001D3F000-memory.dmp themida behavioral1/memory/2816-61-0x0000000000EB0000-0x0000000001D3F000-memory.dmp themida behavioral1/memory/2816-101-0x0000000000EB0000-0x0000000001D3F000-memory.dmp themida behavioral1/files/0x00080000000120ed-104.dat themida behavioral1/memory/1016-105-0x0000000000EB0000-0x0000000001D3F000-memory.dmp themida behavioral1/memory/1016-108-0x0000000000EB0000-0x0000000001D3F000-memory.dmp themida behavioral1/memory/1016-147-0x0000000000EB0000-0x0000000001D3F000-memory.dmp themida behavioral1/files/0x00080000000120ed-154.dat themida behavioral1/memory/1776-155-0x0000000000EB0000-0x0000000001D3F000-memory.dmp themida behavioral1/memory/1776-157-0x0000000000EB0000-0x0000000001D3F000-memory.dmp themida behavioral1/memory/1776-197-0x0000000000EB0000-0x0000000001D3F000-memory.dmp themida behavioral1/files/0x00080000000120ed-204.dat themida behavioral1/memory/2992-205-0x0000000000EB0000-0x0000000001D3F000-memory.dmp themida behavioral1/memory/2992-246-0x0000000000EB0000-0x0000000001D3F000-memory.dmp themida behavioral1/files/0x00080000000120ed-253.dat themida behavioral1/memory/2976-254-0x0000000000EB0000-0x0000000001D3F000-memory.dmp themida behavioral1/memory/2976-295-0x0000000000EB0000-0x0000000001D3F000-memory.dmp themida behavioral1/files/0x00080000000120ed-302.dat themida behavioral1/memory/1616-305-0x0000000000EB0000-0x0000000001D3F000-memory.dmp themida behavioral1/memory/1616-344-0x0000000000EB0000-0x0000000001D3F000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XRJNZC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XRJNZC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XRJNZC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XRJNZC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XRJNZC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XRJNZC.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2492 aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4.exe 2816 XRJNZC.exe 1016 XRJNZC.exe 1776 XRJNZC.exe 2992 XRJNZC.exe 2976 XRJNZC.exe 1616 XRJNZC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2580 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2680 timeout.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2492 aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4.exe 2816 XRJNZC.exe 1016 XRJNZC.exe 1776 XRJNZC.exe 2992 XRJNZC.exe 2976 XRJNZC.exe 1616 XRJNZC.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2576 2492 aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4.exe 29 PID 2492 wrote to memory of 2576 2492 aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4.exe 29 PID 2492 wrote to memory of 2576 2492 aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4.exe 29 PID 2492 wrote to memory of 2576 2492 aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4.exe 29 PID 2576 wrote to memory of 2680 2576 cmd.exe 30 PID 2576 wrote to memory of 2680 2576 cmd.exe 30 PID 2576 wrote to memory of 2680 2576 cmd.exe 30 PID 2576 wrote to memory of 2680 2576 cmd.exe 30 PID 2576 wrote to memory of 2816 2576 cmd.exe 31 PID 2576 wrote to memory of 2816 2576 cmd.exe 31 PID 2576 wrote to memory of 2816 2576 cmd.exe 31 PID 2576 wrote to memory of 2816 2576 cmd.exe 31 PID 2816 wrote to memory of 2580 2816 XRJNZC.exe 33 PID 2816 wrote to memory of 2580 2816 XRJNZC.exe 33 PID 2816 wrote to memory of 2580 2816 XRJNZC.exe 33 PID 2816 wrote to memory of 2580 2816 XRJNZC.exe 33 PID 2448 wrote to memory of 1016 2448 taskeng.exe 37 PID 2448 wrote to memory of 1016 2448 taskeng.exe 37 PID 2448 wrote to memory of 1016 2448 taskeng.exe 37 PID 2448 wrote to memory of 1016 2448 taskeng.exe 37 PID 2448 wrote to memory of 1776 2448 taskeng.exe 38 PID 2448 wrote to memory of 1776 2448 taskeng.exe 38 PID 2448 wrote to memory of 1776 2448 taskeng.exe 38 PID 2448 wrote to memory of 1776 2448 taskeng.exe 38 PID 2448 wrote to memory of 2992 2448 taskeng.exe 39 PID 2448 wrote to memory of 2992 2448 taskeng.exe 39 PID 2448 wrote to memory of 2992 2448 taskeng.exe 39 PID 2448 wrote to memory of 2992 2448 taskeng.exe 39 PID 2448 wrote to memory of 2976 2448 taskeng.exe 40 PID 2448 wrote to memory of 2976 2448 taskeng.exe 40 PID 2448 wrote to memory of 2976 2448 taskeng.exe 40 PID 2448 wrote to memory of 2976 2448 taskeng.exe 40 PID 2448 wrote to memory of 1616 2448 taskeng.exe 41 PID 2448 wrote to memory of 1616 2448 taskeng.exe 41 PID 2448 wrote to memory of 1616 2448 taskeng.exe 41 PID 2448 wrote to memory of 1616 2448 taskeng.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4.exe"C:\Users\Admin\AppData\Local\Temp\aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\s1x8.0.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2680
-
-
C:\ProgramData\pinterests\XRJNZC.exe"C:\ProgramData\pinterests\XRJNZC.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "XRJNZC" /tr C:\ProgramData\pinterests\XRJNZC.exe /f4⤵
- Creates scheduled task(s)
PID:2580
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {062B816F-5BE0-4506-9CD5-9824AB59A6AE} S-1-5-21-1154728922-3261336865-3456416385-1000:TLIDUQCQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.7MB
MD5a6d0999d10c4d3a1aee18d73693a5b13
SHA1298d75d1850f7596991aa739fd73738982792442
SHA256aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4
SHA512f5e1e976f7e7a561081297c293d11c06ae471d90d0df167fc57c581cb4cb6b2b5d31f7a8c413de058e9f924b55a9a44c338c6c054ee0947f87dfd59d6b6c3348
-
Filesize
5.7MB
MD5a6d0999d10c4d3a1aee18d73693a5b13
SHA1298d75d1850f7596991aa739fd73738982792442
SHA256aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4
SHA512f5e1e976f7e7a561081297c293d11c06ae471d90d0df167fc57c581cb4cb6b2b5d31f7a8c413de058e9f924b55a9a44c338c6c054ee0947f87dfd59d6b6c3348
-
Filesize
5.7MB
MD5a6d0999d10c4d3a1aee18d73693a5b13
SHA1298d75d1850f7596991aa739fd73738982792442
SHA256aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4
SHA512f5e1e976f7e7a561081297c293d11c06ae471d90d0df167fc57c581cb4cb6b2b5d31f7a8c413de058e9f924b55a9a44c338c6c054ee0947f87dfd59d6b6c3348
-
Filesize
5.7MB
MD5a6d0999d10c4d3a1aee18d73693a5b13
SHA1298d75d1850f7596991aa739fd73738982792442
SHA256aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4
SHA512f5e1e976f7e7a561081297c293d11c06ae471d90d0df167fc57c581cb4cb6b2b5d31f7a8c413de058e9f924b55a9a44c338c6c054ee0947f87dfd59d6b6c3348
-
Filesize
5.7MB
MD5a6d0999d10c4d3a1aee18d73693a5b13
SHA1298d75d1850f7596991aa739fd73738982792442
SHA256aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4
SHA512f5e1e976f7e7a561081297c293d11c06ae471d90d0df167fc57c581cb4cb6b2b5d31f7a8c413de058e9f924b55a9a44c338c6c054ee0947f87dfd59d6b6c3348
-
Filesize
5.7MB
MD5a6d0999d10c4d3a1aee18d73693a5b13
SHA1298d75d1850f7596991aa739fd73738982792442
SHA256aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4
SHA512f5e1e976f7e7a561081297c293d11c06ae471d90d0df167fc57c581cb4cb6b2b5d31f7a8c413de058e9f924b55a9a44c338c6c054ee0947f87dfd59d6b6c3348
-
Filesize
5.7MB
MD5a6d0999d10c4d3a1aee18d73693a5b13
SHA1298d75d1850f7596991aa739fd73738982792442
SHA256aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4
SHA512f5e1e976f7e7a561081297c293d11c06ae471d90d0df167fc57c581cb4cb6b2b5d31f7a8c413de058e9f924b55a9a44c338c6c054ee0947f87dfd59d6b6c3348
-
Filesize
176B
MD5c6237bed7bb41b25a88f8fa196bbcc7c
SHA112cd6d8135e4c99fecc641a54ff1a59945d5d2ab
SHA256b1ce85c286ace98fe1aa00b916eb93d69cf71d7fa96a7f935a93364019be7c79
SHA51211f42dd8be99c51a8f2be035c4187dd5a07c32877e43e4001ee4a58162d2d38cba0df1b487ecef04b7ada68096fe112b2e0d3610d447ccc9976de2dd5ae47468
-
Filesize
176B
MD5c6237bed7bb41b25a88f8fa196bbcc7c
SHA112cd6d8135e4c99fecc641a54ff1a59945d5d2ab
SHA256b1ce85c286ace98fe1aa00b916eb93d69cf71d7fa96a7f935a93364019be7c79
SHA51211f42dd8be99c51a8f2be035c4187dd5a07c32877e43e4001ee4a58162d2d38cba0df1b487ecef04b7ada68096fe112b2e0d3610d447ccc9976de2dd5ae47468
-
Filesize
5.7MB
MD5a6d0999d10c4d3a1aee18d73693a5b13
SHA1298d75d1850f7596991aa739fd73738982792442
SHA256aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4
SHA512f5e1e976f7e7a561081297c293d11c06ae471d90d0df167fc57c581cb4cb6b2b5d31f7a8c413de058e9f924b55a9a44c338c6c054ee0947f87dfd59d6b6c3348