Resubmissions

14/03/2024, 11:13

240314-nbn2qacg58 9

16/12/2023, 15:21

231216-srg1kadce2 9

16/12/2023, 14:59

231216-sczxtsbhdl 9

Analysis

  • max time kernel
    147s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    16/12/2023, 15:21

General

  • Target

    920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b.exe

  • Size

    5.4MB

  • MD5

    5159b9560de1977a84ec551997912756

  • SHA1

    e85828592e9e3a819cb2ca3e93408eefd6baf3c1

  • SHA256

    920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b

  • SHA512

    3c81017945feb562cfc21a871a998fae2099bd5633b833b7acc89dba4cb7d9fa673a31c41b7d6ae5e86bd81075714e2289dfa10818e324cef97cff40ba36c79e

  • SSDEEP

    98304:ymqreXpB/IE/mCZa2M7qCc2GYCYuq7fEtV8jkV6qlqGKPbAjHsNeU0upVBwsXl:fr5Bz/NM7qCb9ZuCfGVt62EAjH6rnes1

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Themida packer 16 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 5 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b.exe
    "C:\Users\Admin\AppData\Local\Temp\920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\s1lo.0.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Windows\SysWOW64\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:2544
      • C:\ProgramData\pinterests\XRJNZC.exe
        "C:\ProgramData\pinterests\XRJNZC.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2620
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "XRJNZC" /tr C:\ProgramData\pinterests\XRJNZC.exe /f
          4⤵
          • Creates scheduled task(s)
          PID:1556
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {2801A9FC-A1EE-4B10-8804-AF37F2B55221} S-1-5-21-3818056530-936619650-3554021955-1000:SFVRQGEO\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:332
    • C:\ProgramData\pinterests\XRJNZC.exe
      C:\ProgramData\pinterests\XRJNZC.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2040
    • C:\ProgramData\pinterests\XRJNZC.exe
      C:\ProgramData\pinterests\XRJNZC.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1904
    • C:\ProgramData\pinterests\XRJNZC.exe
      C:\ProgramData\pinterests\XRJNZC.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2548

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\pinterests\XRJNZC.exe

          Filesize

          3.1MB

          MD5

          c22e1f8be949a6025f84d9c14975d5da

          SHA1

          378af454e445adbfc2654108a9adb556eceb4caf

          SHA256

          b0d06e3c6d9a941101323774c9723f0760846cc2a620433b0bcba6657e665bf0

          SHA512

          775232fb5c581753a2636c1ca03f6132fcec1db16d860f473cba5ac73a21737e8634604d8e9aacdf0be13e406654acdfd35ec3ef3d9f11159a6909b2342c2d82

        • C:\ProgramData\pinterests\XRJNZC.exe

          Filesize

          5.4MB

          MD5

          5159b9560de1977a84ec551997912756

          SHA1

          e85828592e9e3a819cb2ca3e93408eefd6baf3c1

          SHA256

          920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b

          SHA512

          3c81017945feb562cfc21a871a998fae2099bd5633b833b7acc89dba4cb7d9fa673a31c41b7d6ae5e86bd81075714e2289dfa10818e324cef97cff40ba36c79e

        • C:\ProgramData\pinterests\XRJNZC.exe

          Filesize

          253KB

          MD5

          609c3db2c2e19c540a8221acfc1e00df

          SHA1

          0a087bad7285642301f522dda5e1bf3757a03990

          SHA256

          099c986ebd94889c2069d6dfe23f3d35231fe3ec8f78fade4dd3c9e05e509ce0

          SHA512

          9c68b1346da444843ac78f749a0fe3bd079adb533f3094d1eeda005810ad287244642c08f030ceb4d05f0826f4558baeed91994bc1eedc723260efe1bcf63b5f

        • C:\ProgramData\pinterests\XRJNZC.exe

          Filesize

          338KB

          MD5

          0fbdf295edb24e7bddfe3c2e13402a89

          SHA1

          2862122ffc7e2205557bcb662dbe3e3ab0cc4b5a

          SHA256

          8d86d98ea98b206e76a3d832849d984cd1c2216c946af88c6dfd0a063b87ec7b

          SHA512

          815e5f79c065973939fa9fb29de371e28f3e6827c2872a19c9007314a4ab312e7298c975366cbe122f23a509787e20569c673ce3210457cf70addc8bfd63d629

        • C:\Users\Admin\AppData\Local\Temp\s1lo.0.bat

          Filesize

          176B

          MD5

          984232914136faf26bad163f716ab607

          SHA1

          b802e7da5b8ae8c5953e24e84de0b0eb39220e34

          SHA256

          56fab21bf3959d12cdf3083f28c94fcbe7703f582bf6a8a2555557e19349b9ce

          SHA512

          e88d94a84e2a2c339433cd77b334abc3470fdcf5afaab0b930fd0edeabc7779ef86be32c287045fc0ebc129306ff7eb5e13dd41796f264cbf1709c403ff18c1d

        • \ProgramData\pinterests\XRJNZC.exe

          Filesize

          330KB

          MD5

          343e506901a76ce3819b37287bab57bf

          SHA1

          80ec21e828b0f5c0e04fba3566a06f2304637116

          SHA256

          fd715fadfe64d7c3612e6c52574655a0a3b28ff8087d840c9cb98c6632c4fa07

          SHA512

          6dd6d7dac0b007077d73eac3195c80eb2ce2de79d2baacb5d1fdaadd88eece2e99d17345d629a6469441ec5c83494c066522d79484398adc965cd65fcd1b5d94

        • memory/2040-183-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2040-191-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2040-186-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2040-188-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2040-189-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2040-190-0x0000000076E40000-0x0000000076E87000-memory.dmp

          Filesize

          284KB

        • memory/2040-187-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2040-185-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2040-192-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2040-184-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2040-193-0x0000000076E40000-0x0000000076E87000-memory.dmp

          Filesize

          284KB

        • memory/2040-194-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2040-182-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2040-181-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2040-180-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2040-147-0x0000000000180000-0x0000000000F3B000-memory.dmp

          Filesize

          13.7MB

        • memory/2076-6-0x0000000000080000-0x0000000000081000-memory.dmp

          Filesize

          4KB

        • memory/2076-42-0x00000000002D0000-0x000000000108B000-memory.dmp

          Filesize

          13.7MB

        • memory/2076-47-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2076-44-0x0000000076E40000-0x0000000076E87000-memory.dmp

          Filesize

          284KB

        • memory/2076-48-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2076-51-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2076-56-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2076-57-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2076-67-0x00000000002D0000-0x000000000108B000-memory.dmp

          Filesize

          13.7MB

        • memory/2076-41-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2076-58-0x00000000777D0000-0x00000000777D2000-memory.dmp

          Filesize

          8KB

        • memory/2076-68-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2076-70-0x0000000076E40000-0x0000000076E87000-memory.dmp

          Filesize

          284KB

        • memory/2076-55-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2076-54-0x0000000076E40000-0x0000000076E87000-memory.dmp

          Filesize

          284KB

        • memory/2076-50-0x0000000076E40000-0x0000000076E87000-memory.dmp

          Filesize

          284KB

        • memory/2076-46-0x00000000002D0000-0x000000000108B000-memory.dmp

          Filesize

          13.7MB

        • memory/2076-49-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2076-43-0x00000000002D0000-0x000000000108B000-memory.dmp

          Filesize

          13.7MB

        • memory/2076-45-0x00000000002D0000-0x000000000108B000-memory.dmp

          Filesize

          13.7MB

        • memory/2076-40-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2076-39-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2076-38-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2076-37-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2076-7-0x0000000000090000-0x0000000000091000-memory.dmp

          Filesize

          4KB

        • memory/2076-9-0x0000000000090000-0x0000000000091000-memory.dmp

          Filesize

          4KB

        • memory/2076-0-0x00000000002D0000-0x000000000108B000-memory.dmp

          Filesize

          13.7MB

        • memory/2076-11-0x0000000000090000-0x0000000000091000-memory.dmp

          Filesize

          4KB

        • memory/2076-14-0x0000000000190000-0x0000000000191000-memory.dmp

          Filesize

          4KB

        • memory/2076-16-0x0000000000190000-0x0000000000191000-memory.dmp

          Filesize

          4KB

        • memory/2076-19-0x00000000001A0000-0x00000000001A1000-memory.dmp

          Filesize

          4KB

        • memory/2076-21-0x00000000001A0000-0x00000000001A1000-memory.dmp

          Filesize

          4KB

        • memory/2076-24-0x00000000001F0000-0x00000000001F1000-memory.dmp

          Filesize

          4KB

        • memory/2076-26-0x00000000001F0000-0x00000000001F1000-memory.dmp

          Filesize

          4KB

        • memory/2076-29-0x0000000000200000-0x0000000000201000-memory.dmp

          Filesize

          4KB

        • memory/2076-31-0x0000000000200000-0x0000000000201000-memory.dmp

          Filesize

          4KB

        • memory/2076-3-0x00000000002D0000-0x000000000108B000-memory.dmp

          Filesize

          13.7MB

        • memory/2076-4-0x0000000000080000-0x0000000000081000-memory.dmp

          Filesize

          4KB

        • memory/2076-1-0x0000000000080000-0x0000000000081000-memory.dmp

          Filesize

          4KB

        • memory/2620-90-0x00000000000A0000-0x00000000000A1000-memory.dmp

          Filesize

          4KB

        • memory/2620-129-0x0000000076E40000-0x0000000076E87000-memory.dmp

          Filesize

          284KB

        • memory/2620-130-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-126-0x0000000076E40000-0x0000000076E87000-memory.dmp

          Filesize

          284KB

        • memory/2620-131-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-132-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-133-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-124-0x0000000076E40000-0x0000000076E87000-memory.dmp

          Filesize

          284KB

        • memory/2620-123-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-120-0x0000000076E40000-0x0000000076E87000-memory.dmp

          Filesize

          284KB

        • memory/2620-135-0x0000000000180000-0x0000000000F3B000-memory.dmp

          Filesize

          13.7MB

        • memory/2620-137-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-128-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-139-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-140-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-141-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-142-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-143-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-127-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-125-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-122-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-118-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-116-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-111-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-114-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-113-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-112-0x0000000075390000-0x00000000754A0000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-80-0x0000000000080000-0x0000000000081000-memory.dmp

          Filesize

          4KB

        • memory/2620-85-0x0000000000090000-0x0000000000091000-memory.dmp

          Filesize

          4KB

        • memory/2620-88-0x00000000000A0000-0x00000000000A1000-memory.dmp

          Filesize

          4KB

        • memory/2620-93-0x00000000000B0000-0x00000000000B1000-memory.dmp

          Filesize

          4KB

        • memory/2620-95-0x00000000000B0000-0x00000000000B1000-memory.dmp

          Filesize

          4KB

        • memory/2620-98-0x00000000000C0000-0x00000000000C1000-memory.dmp

          Filesize

          4KB

        • memory/2620-76-0x0000000000180000-0x0000000000F3B000-memory.dmp

          Filesize

          13.7MB

        • memory/2620-74-0x0000000000180000-0x0000000000F3B000-memory.dmp

          Filesize

          13.7MB