Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2023 08:14
General
-
Target
3c193974cba2761aff38a848a4e9f31b5c8fcdff40595c8db24be95af7af6f7a.exe
-
Size
5.8MB
-
MD5
f638388e90b248c8289fe001cd81c259
-
SHA1
974e3496f915fa1ecc8dcaf97faaf3c9c3da099a
-
SHA256
3c193974cba2761aff38a848a4e9f31b5c8fcdff40595c8db24be95af7af6f7a
-
SHA512
1aa39336199b5362818cfc4a59e8bf0c957bd30b66b420af3593fa36d02e49571dd35c74ea92dabd14599ae7324e4ccfdb04f9b5ad4effec1e079c893d75cf2d
-
SSDEEP
98304:rUnbzxgNgqVpbTYVgZoj47MZ5FV0ZIvY4mQj1zvJmCwz6GFqknoYv6bBDF1c7jdN:rUnbtgNvpbXZ778hsIvY6j1cfuGFqiou
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3c193974cba2761aff38a848a4e9f31b5c8fcdff40595c8db24be95af7af6f7a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XRJNZC.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3c193974cba2761aff38a848a4e9f31b5c8fcdff40595c8db24be95af7af6f7a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3c193974cba2761aff38a848a4e9f31b5c8fcdff40595c8db24be95af7af6f7a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XRJNZC.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation 3c193974cba2761aff38a848a4e9f31b5c8fcdff40595c8db24be95af7af6f7a.exe -
Executes dropped EXE 1 IoCs
pid Process 3600 XRJNZC.exe -
resource yara_rule behavioral1/memory/2364-0-0x0000000000F10000-0x0000000001D0E000-memory.dmp themida behavioral1/memory/2364-4-0x0000000000F10000-0x0000000001D0E000-memory.dmp themida behavioral1/memory/2364-13-0x0000000000F10000-0x0000000001D0E000-memory.dmp themida behavioral1/memory/2364-14-0x0000000000F10000-0x0000000001D0E000-memory.dmp themida behavioral1/memory/2364-15-0x0000000000F10000-0x0000000001D0E000-memory.dmp themida behavioral1/memory/2364-16-0x0000000000F10000-0x0000000001D0E000-memory.dmp themida behavioral1/memory/2364-17-0x0000000000F10000-0x0000000001D0E000-memory.dmp themida behavioral1/memory/2364-23-0x0000000000F10000-0x0000000001D0E000-memory.dmp themida behavioral1/files/0x0006000000022dd9-26.dat themida behavioral1/memory/3600-27-0x00000000008E0000-0x00000000016DE000-memory.dmp themida behavioral1/memory/3600-32-0x00000000008E0000-0x00000000016DE000-memory.dmp themida behavioral1/memory/3600-35-0x00000000008E0000-0x00000000016DE000-memory.dmp themida behavioral1/memory/3600-39-0x00000000008E0000-0x00000000016DE000-memory.dmp themida behavioral1/memory/3600-40-0x00000000008E0000-0x00000000016DE000-memory.dmp themida behavioral1/memory/3600-41-0x00000000008E0000-0x00000000016DE000-memory.dmp themida behavioral1/memory/3600-42-0x00000000008E0000-0x00000000016DE000-memory.dmp themida behavioral1/memory/3600-43-0x00000000008E0000-0x00000000016DE000-memory.dmp themida behavioral1/files/0x0006000000022dd9-44.dat themida behavioral1/memory/3600-45-0x00000000008E0000-0x00000000016DE000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3c193974cba2761aff38a848a4e9f31b5c8fcdff40595c8db24be95af7af6f7a.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XRJNZC.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2364 3c193974cba2761aff38a848a4e9f31b5c8fcdff40595c8db24be95af7af6f7a.exe 3600 XRJNZC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5072 3600 WerFault.exe 93 -
Delays execution with timeout.exe 1 IoCs
pid Process 4324 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2364 3c193974cba2761aff38a848a4e9f31b5c8fcdff40595c8db24be95af7af6f7a.exe 2364 3c193974cba2761aff38a848a4e9f31b5c8fcdff40595c8db24be95af7af6f7a.exe 3600 XRJNZC.exe 3600 XRJNZC.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2364 wrote to memory of 3232 2364 3c193974cba2761aff38a848a4e9f31b5c8fcdff40595c8db24be95af7af6f7a.exe 86 PID 2364 wrote to memory of 3232 2364 3c193974cba2761aff38a848a4e9f31b5c8fcdff40595c8db24be95af7af6f7a.exe 86 PID 2364 wrote to memory of 3232 2364 3c193974cba2761aff38a848a4e9f31b5c8fcdff40595c8db24be95af7af6f7a.exe 86 PID 3232 wrote to memory of 4324 3232 cmd.exe 88 PID 3232 wrote to memory of 4324 3232 cmd.exe 88 PID 3232 wrote to memory of 4324 3232 cmd.exe 88 PID 3232 wrote to memory of 3600 3232 cmd.exe 93 PID 3232 wrote to memory of 3600 3232 cmd.exe 93 PID 3232 wrote to memory of 3600 3232 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c193974cba2761aff38a848a4e9f31b5c8fcdff40595c8db24be95af7af6f7a.exe"C:\Users\Admin\AppData\Local\Temp\3c193974cba2761aff38a848a4e9f31b5c8fcdff40595c8db24be95af7af6f7a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\s1to.0.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4324
-
-
C:\ProgramData\pinterests\XRJNZC.exe"C:\ProgramData\pinterests\XRJNZC.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 5124⤵
- Program crash
PID:5072
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3600 -ip 36001⤵PID:3216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.8MB
MD5f638388e90b248c8289fe001cd81c259
SHA1974e3496f915fa1ecc8dcaf97faaf3c9c3da099a
SHA2563c193974cba2761aff38a848a4e9f31b5c8fcdff40595c8db24be95af7af6f7a
SHA5121aa39336199b5362818cfc4a59e8bf0c957bd30b66b420af3593fa36d02e49571dd35c74ea92dabd14599ae7324e4ccfdb04f9b5ad4effec1e079c893d75cf2d
-
Filesize
5.8MB
MD5f638388e90b248c8289fe001cd81c259
SHA1974e3496f915fa1ecc8dcaf97faaf3c9c3da099a
SHA2563c193974cba2761aff38a848a4e9f31b5c8fcdff40595c8db24be95af7af6f7a
SHA5121aa39336199b5362818cfc4a59e8bf0c957bd30b66b420af3593fa36d02e49571dd35c74ea92dabd14599ae7324e4ccfdb04f9b5ad4effec1e079c893d75cf2d
-
Filesize
176B
MD540331eceb249f153e95e58f711084123
SHA1e1b71a7d3b140a5d770de616a564547b4cd19c43
SHA256ada91eba82667656112e76aa43c7ea3af4b1f290d44fe24fa6b5fa359a8b4e7b
SHA51290cacd7f2fc49867d76dd9578a07861c71eeac1b9d728cde22964cc88e4549728a1be949e790bff6b0f7bd57cf3daa955e33e64f69432f91e958b3e93ffb52a6