Analysis

  • max time kernel
    300s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2023, 05:00

General

  • Target

    aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4.exe

  • Size

    5.7MB

  • MD5

    a6d0999d10c4d3a1aee18d73693a5b13

  • SHA1

    298d75d1850f7596991aa739fd73738982792442

  • SHA256

    aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4

  • SHA512

    f5e1e976f7e7a561081297c293d11c06ae471d90d0df167fc57c581cb4cb6b2b5d31f7a8c413de058e9f924b55a9a44c338c6c054ee0947f87dfd59d6b6c3348

  • SSDEEP

    98304:9BALWhkuHRdKG2B746zHzhEgNgqVpbTYVgZoj47MZ5FV0ZIvY4mQj1zvJoBeTPRZ:9mahkuHRl2jzGgNvpbXZ778hsIvY6j1R

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 1 IoCs
  • Themida packer 33 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 7 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4.exe
    "C:\Users\Admin\AppData\Local\Temp\aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\s1x8.0.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Windows\SysWOW64\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:2680
      • C:\ProgramData\pinterests\XRJNZC.exe
        "C:\ProgramData\pinterests\XRJNZC.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2816
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "XRJNZC" /tr C:\ProgramData\pinterests\XRJNZC.exe /f
          4⤵
          • Creates scheduled task(s)
          PID:2580
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {062B816F-5BE0-4506-9CD5-9824AB59A6AE} S-1-5-21-1154728922-3261336865-3456416385-1000:TLIDUQCQ\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\ProgramData\pinterests\XRJNZC.exe
      C:\ProgramData\pinterests\XRJNZC.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1016
    • C:\ProgramData\pinterests\XRJNZC.exe
      C:\ProgramData\pinterests\XRJNZC.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1776
    • C:\ProgramData\pinterests\XRJNZC.exe
      C:\ProgramData\pinterests\XRJNZC.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2992
    • C:\ProgramData\pinterests\XRJNZC.exe
      C:\ProgramData\pinterests\XRJNZC.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2976
    • C:\ProgramData\pinterests\XRJNZC.exe
      C:\ProgramData\pinterests\XRJNZC.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\pinterests\XRJNZC.exe

    Filesize

    5.7MB

    MD5

    a6d0999d10c4d3a1aee18d73693a5b13

    SHA1

    298d75d1850f7596991aa739fd73738982792442

    SHA256

    aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4

    SHA512

    f5e1e976f7e7a561081297c293d11c06ae471d90d0df167fc57c581cb4cb6b2b5d31f7a8c413de058e9f924b55a9a44c338c6c054ee0947f87dfd59d6b6c3348

  • C:\ProgramData\pinterests\XRJNZC.exe

    Filesize

    5.7MB

    MD5

    a6d0999d10c4d3a1aee18d73693a5b13

    SHA1

    298d75d1850f7596991aa739fd73738982792442

    SHA256

    aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4

    SHA512

    f5e1e976f7e7a561081297c293d11c06ae471d90d0df167fc57c581cb4cb6b2b5d31f7a8c413de058e9f924b55a9a44c338c6c054ee0947f87dfd59d6b6c3348

  • C:\ProgramData\pinterests\XRJNZC.exe

    Filesize

    5.7MB

    MD5

    a6d0999d10c4d3a1aee18d73693a5b13

    SHA1

    298d75d1850f7596991aa739fd73738982792442

    SHA256

    aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4

    SHA512

    f5e1e976f7e7a561081297c293d11c06ae471d90d0df167fc57c581cb4cb6b2b5d31f7a8c413de058e9f924b55a9a44c338c6c054ee0947f87dfd59d6b6c3348

  • C:\ProgramData\pinterests\XRJNZC.exe

    Filesize

    5.7MB

    MD5

    a6d0999d10c4d3a1aee18d73693a5b13

    SHA1

    298d75d1850f7596991aa739fd73738982792442

    SHA256

    aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4

    SHA512

    f5e1e976f7e7a561081297c293d11c06ae471d90d0df167fc57c581cb4cb6b2b5d31f7a8c413de058e9f924b55a9a44c338c6c054ee0947f87dfd59d6b6c3348

  • C:\ProgramData\pinterests\XRJNZC.exe

    Filesize

    5.7MB

    MD5

    a6d0999d10c4d3a1aee18d73693a5b13

    SHA1

    298d75d1850f7596991aa739fd73738982792442

    SHA256

    aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4

    SHA512

    f5e1e976f7e7a561081297c293d11c06ae471d90d0df167fc57c581cb4cb6b2b5d31f7a8c413de058e9f924b55a9a44c338c6c054ee0947f87dfd59d6b6c3348

  • C:\ProgramData\pinterests\XRJNZC.exe

    Filesize

    5.7MB

    MD5

    a6d0999d10c4d3a1aee18d73693a5b13

    SHA1

    298d75d1850f7596991aa739fd73738982792442

    SHA256

    aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4

    SHA512

    f5e1e976f7e7a561081297c293d11c06ae471d90d0df167fc57c581cb4cb6b2b5d31f7a8c413de058e9f924b55a9a44c338c6c054ee0947f87dfd59d6b6c3348

  • C:\ProgramData\pinterests\XRJNZC.exe

    Filesize

    5.7MB

    MD5

    a6d0999d10c4d3a1aee18d73693a5b13

    SHA1

    298d75d1850f7596991aa739fd73738982792442

    SHA256

    aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4

    SHA512

    f5e1e976f7e7a561081297c293d11c06ae471d90d0df167fc57c581cb4cb6b2b5d31f7a8c413de058e9f924b55a9a44c338c6c054ee0947f87dfd59d6b6c3348

  • C:\Users\Admin\AppData\Local\Temp\s1x8.0.bat

    Filesize

    176B

    MD5

    c6237bed7bb41b25a88f8fa196bbcc7c

    SHA1

    12cd6d8135e4c99fecc641a54ff1a59945d5d2ab

    SHA256

    b1ce85c286ace98fe1aa00b916eb93d69cf71d7fa96a7f935a93364019be7c79

    SHA512

    11f42dd8be99c51a8f2be035c4187dd5a07c32877e43e4001ee4a58162d2d38cba0df1b487ecef04b7ada68096fe112b2e0d3610d447ccc9976de2dd5ae47468

  • C:\Users\Admin\AppData\Local\Temp\s1x8.0.bat

    Filesize

    176B

    MD5

    c6237bed7bb41b25a88f8fa196bbcc7c

    SHA1

    12cd6d8135e4c99fecc641a54ff1a59945d5d2ab

    SHA256

    b1ce85c286ace98fe1aa00b916eb93d69cf71d7fa96a7f935a93364019be7c79

    SHA512

    11f42dd8be99c51a8f2be035c4187dd5a07c32877e43e4001ee4a58162d2d38cba0df1b487ecef04b7ada68096fe112b2e0d3610d447ccc9976de2dd5ae47468

  • \ProgramData\pinterests\XRJNZC.exe

    Filesize

    5.7MB

    MD5

    a6d0999d10c4d3a1aee18d73693a5b13

    SHA1

    298d75d1850f7596991aa739fd73738982792442

    SHA256

    aa2ec7e92bfa5b35348bcf635e7811c4e8f01ef8bd3888997cf559d1b0e72fc4

    SHA512

    f5e1e976f7e7a561081297c293d11c06ae471d90d0df167fc57c581cb4cb6b2b5d31f7a8c413de058e9f924b55a9a44c338c6c054ee0947f87dfd59d6b6c3348

  • memory/1016-108-0x0000000000EB0000-0x0000000001D3F000-memory.dmp

    Filesize

    14.6MB

  • memory/1016-105-0x0000000000EB0000-0x0000000001D3F000-memory.dmp

    Filesize

    14.6MB

  • memory/1016-147-0x0000000000EB0000-0x0000000001D3F000-memory.dmp

    Filesize

    14.6MB

  • memory/1616-344-0x0000000000EB0000-0x0000000001D3F000-memory.dmp

    Filesize

    14.6MB

  • memory/1616-305-0x0000000000EB0000-0x0000000001D3F000-memory.dmp

    Filesize

    14.6MB

  • memory/1776-197-0x0000000000EB0000-0x0000000001D3F000-memory.dmp

    Filesize

    14.6MB

  • memory/1776-157-0x0000000000EB0000-0x0000000001D3F000-memory.dmp

    Filesize

    14.6MB

  • memory/1776-155-0x0000000000EB0000-0x0000000001D3F000-memory.dmp

    Filesize

    14.6MB

  • memory/2492-41-0x00000000013A0000-0x000000000222F000-memory.dmp

    Filesize

    14.6MB

  • memory/2492-29-0x0000000000150000-0x0000000000151000-memory.dmp

    Filesize

    4KB

  • memory/2492-39-0x00000000013A0000-0x000000000222F000-memory.dmp

    Filesize

    14.6MB

  • memory/2492-40-0x00000000013A0000-0x000000000222F000-memory.dmp

    Filesize

    14.6MB

  • memory/2492-21-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/2492-19-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/2492-52-0x00000000013A0000-0x000000000222F000-memory.dmp

    Filesize

    14.6MB

  • memory/2492-14-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2492-16-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2492-11-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2492-9-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2492-26-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/2492-24-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/2492-1-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/2492-3-0x00000000013A0000-0x000000000222F000-memory.dmp

    Filesize

    14.6MB

  • memory/2492-4-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/2492-38-0x00000000013A0000-0x000000000222F000-memory.dmp

    Filesize

    14.6MB

  • memory/2492-31-0x0000000000150000-0x0000000000151000-memory.dmp

    Filesize

    4KB

  • memory/2492-32-0x00000000013A0000-0x000000000222F000-memory.dmp

    Filesize

    14.6MB

  • memory/2492-6-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/2492-37-0x0000000077510000-0x0000000077512000-memory.dmp

    Filesize

    8KB

  • memory/2492-7-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2492-36-0x00000000013A0000-0x000000000222F000-memory.dmp

    Filesize

    14.6MB

  • memory/2492-0-0x00000000013A0000-0x000000000222F000-memory.dmp

    Filesize

    14.6MB

  • memory/2576-57-0x0000000002230000-0x00000000030BF000-memory.dmp

    Filesize

    14.6MB

  • memory/2816-61-0x0000000000EB0000-0x0000000001D3F000-memory.dmp

    Filesize

    14.6MB

  • memory/2816-79-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/2816-74-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2816-64-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/2816-67-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/2816-69-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/2816-58-0x0000000000EB0000-0x0000000001D3F000-memory.dmp

    Filesize

    14.6MB

  • memory/2816-62-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/2816-101-0x0000000000EB0000-0x0000000001D3F000-memory.dmp

    Filesize

    14.6MB

  • memory/2976-254-0x0000000000EB0000-0x0000000001D3F000-memory.dmp

    Filesize

    14.6MB

  • memory/2976-295-0x0000000000EB0000-0x0000000001D3F000-memory.dmp

    Filesize

    14.6MB

  • memory/2992-246-0x0000000000EB0000-0x0000000001D3F000-memory.dmp

    Filesize

    14.6MB

  • memory/2992-205-0x0000000000EB0000-0x0000000001D3F000-memory.dmp

    Filesize

    14.6MB