Resubmissions
14/03/2024, 11:13
240314-nbn2qacg58 916/12/2023, 15:21
231216-srg1kadce2 916/12/2023, 14:59
231216-sczxtsbhdl 9Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
16/12/2023, 15:21
Behavioral task
behavioral1
Sample
920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b.exe
Resource
win7-20231215-en
General
-
Target
920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b.exe
-
Size
5.4MB
-
MD5
5159b9560de1977a84ec551997912756
-
SHA1
e85828592e9e3a819cb2ca3e93408eefd6baf3c1
-
SHA256
920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b
-
SHA512
3c81017945feb562cfc21a871a998fae2099bd5633b833b7acc89dba4cb7d9fa673a31c41b7d6ae5e86bd81075714e2289dfa10818e324cef97cff40ba36c79e
-
SSDEEP
98304:ymqreXpB/IE/mCZa2M7qCc2GYCYuq7fEtV8jkV6qlqGKPbAjHsNeU0upVBwsXl:fr5Bz/NM7qCb9ZuCfGVt62EAjH6rnes1
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XRJNZC.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XRJNZC.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XRJNZC.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XRJNZC.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XRJNZC.exe -
Executes dropped EXE 4 IoCs
pid Process 2620 XRJNZC.exe 2040 XRJNZC.exe 1904 XRJNZC.exe 2548 XRJNZC.exe -
Loads dropped DLL 1 IoCs
pid Process 2684 cmd.exe -
resource yara_rule behavioral1/memory/2076-0-0x00000000002D0000-0x000000000108B000-memory.dmp themida behavioral1/memory/2076-3-0x00000000002D0000-0x000000000108B000-memory.dmp themida behavioral1/memory/2076-42-0x00000000002D0000-0x000000000108B000-memory.dmp themida behavioral1/memory/2076-43-0x00000000002D0000-0x000000000108B000-memory.dmp themida behavioral1/memory/2076-45-0x00000000002D0000-0x000000000108B000-memory.dmp themida behavioral1/memory/2076-67-0x00000000002D0000-0x000000000108B000-memory.dmp themida behavioral1/memory/2076-46-0x00000000002D0000-0x000000000108B000-memory.dmp themida behavioral1/files/0x000c000000015cbd-73.dat themida behavioral1/memory/2620-74-0x0000000000180000-0x0000000000F3B000-memory.dmp themida behavioral1/files/0x000c000000015cbd-72.dat themida behavioral1/files/0x000c000000015cbd-71.dat themida behavioral1/memory/2620-76-0x0000000000180000-0x0000000000F3B000-memory.dmp themida behavioral1/memory/2620-135-0x0000000000180000-0x0000000000F3B000-memory.dmp themida behavioral1/files/0x000c000000015cbd-138.dat themida behavioral1/memory/2040-147-0x0000000000180000-0x0000000000F3B000-memory.dmp themida behavioral1/files/0x000c000000015cbd-214.dat themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XRJNZC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XRJNZC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XRJNZC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XRJNZC.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2076 920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b.exe 2620 XRJNZC.exe 2040 XRJNZC.exe 1904 XRJNZC.exe 2548 XRJNZC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1556 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2544 timeout.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2076 920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b.exe 2076 920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b.exe 2620 XRJNZC.exe 2620 XRJNZC.exe 2040 XRJNZC.exe 2040 XRJNZC.exe 1904 XRJNZC.exe 1904 XRJNZC.exe 2548 XRJNZC.exe 2548 XRJNZC.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2684 2076 920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b.exe 29 PID 2076 wrote to memory of 2684 2076 920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b.exe 29 PID 2076 wrote to memory of 2684 2076 920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b.exe 29 PID 2076 wrote to memory of 2684 2076 920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b.exe 29 PID 2684 wrote to memory of 2544 2684 cmd.exe 30 PID 2684 wrote to memory of 2544 2684 cmd.exe 30 PID 2684 wrote to memory of 2544 2684 cmd.exe 30 PID 2684 wrote to memory of 2544 2684 cmd.exe 30 PID 2684 wrote to memory of 2620 2684 cmd.exe 31 PID 2684 wrote to memory of 2620 2684 cmd.exe 31 PID 2684 wrote to memory of 2620 2684 cmd.exe 31 PID 2684 wrote to memory of 2620 2684 cmd.exe 31 PID 2620 wrote to memory of 1556 2620 XRJNZC.exe 33 PID 2620 wrote to memory of 1556 2620 XRJNZC.exe 33 PID 2620 wrote to memory of 1556 2620 XRJNZC.exe 33 PID 2620 wrote to memory of 1556 2620 XRJNZC.exe 33 PID 332 wrote to memory of 2040 332 taskeng.exe 35 PID 332 wrote to memory of 2040 332 taskeng.exe 35 PID 332 wrote to memory of 2040 332 taskeng.exe 35 PID 332 wrote to memory of 2040 332 taskeng.exe 35 PID 332 wrote to memory of 1904 332 taskeng.exe 38 PID 332 wrote to memory of 1904 332 taskeng.exe 38 PID 332 wrote to memory of 1904 332 taskeng.exe 38 PID 332 wrote to memory of 1904 332 taskeng.exe 38 PID 332 wrote to memory of 2548 332 taskeng.exe 39 PID 332 wrote to memory of 2548 332 taskeng.exe 39 PID 332 wrote to memory of 2548 332 taskeng.exe 39 PID 332 wrote to memory of 2548 332 taskeng.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b.exe"C:\Users\Admin\AppData\Local\Temp\920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\s1lo.0.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2544
-
-
C:\ProgramData\pinterests\XRJNZC.exe"C:\ProgramData\pinterests\XRJNZC.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "XRJNZC" /tr C:\ProgramData\pinterests\XRJNZC.exe /f4⤵
- Creates scheduled task(s)
PID:1556
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {2801A9FC-A1EE-4B10-8804-AF37F2B55221} S-1-5-21-3818056530-936619650-3554021955-1000:SFVRQGEO\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:332 -
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1904
-
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5c22e1f8be949a6025f84d9c14975d5da
SHA1378af454e445adbfc2654108a9adb556eceb4caf
SHA256b0d06e3c6d9a941101323774c9723f0760846cc2a620433b0bcba6657e665bf0
SHA512775232fb5c581753a2636c1ca03f6132fcec1db16d860f473cba5ac73a21737e8634604d8e9aacdf0be13e406654acdfd35ec3ef3d9f11159a6909b2342c2d82
-
Filesize
5.4MB
MD55159b9560de1977a84ec551997912756
SHA1e85828592e9e3a819cb2ca3e93408eefd6baf3c1
SHA256920371831cd4c054dd978298a63164deeccc13e47f163aad5b11bbfa4cd7bc5b
SHA5123c81017945feb562cfc21a871a998fae2099bd5633b833b7acc89dba4cb7d9fa673a31c41b7d6ae5e86bd81075714e2289dfa10818e324cef97cff40ba36c79e
-
Filesize
253KB
MD5609c3db2c2e19c540a8221acfc1e00df
SHA10a087bad7285642301f522dda5e1bf3757a03990
SHA256099c986ebd94889c2069d6dfe23f3d35231fe3ec8f78fade4dd3c9e05e509ce0
SHA5129c68b1346da444843ac78f749a0fe3bd079adb533f3094d1eeda005810ad287244642c08f030ceb4d05f0826f4558baeed91994bc1eedc723260efe1bcf63b5f
-
Filesize
338KB
MD50fbdf295edb24e7bddfe3c2e13402a89
SHA12862122ffc7e2205557bcb662dbe3e3ab0cc4b5a
SHA2568d86d98ea98b206e76a3d832849d984cd1c2216c946af88c6dfd0a063b87ec7b
SHA512815e5f79c065973939fa9fb29de371e28f3e6827c2872a19c9007314a4ab312e7298c975366cbe122f23a509787e20569c673ce3210457cf70addc8bfd63d629
-
Filesize
176B
MD5984232914136faf26bad163f716ab607
SHA1b802e7da5b8ae8c5953e24e84de0b0eb39220e34
SHA25656fab21bf3959d12cdf3083f28c94fcbe7703f582bf6a8a2555557e19349b9ce
SHA512e88d94a84e2a2c339433cd77b334abc3470fdcf5afaab0b930fd0edeabc7779ef86be32c287045fc0ebc129306ff7eb5e13dd41796f264cbf1709c403ff18c1d
-
Filesize
330KB
MD5343e506901a76ce3819b37287bab57bf
SHA180ec21e828b0f5c0e04fba3566a06f2304637116
SHA256fd715fadfe64d7c3612e6c52574655a0a3b28ff8087d840c9cb98c6632c4fa07
SHA5126dd6d7dac0b007077d73eac3195c80eb2ce2de79d2baacb5d1fdaadd88eece2e99d17345d629a6469441ec5c83494c066522d79484398adc965cd65fcd1b5d94