Analysis
-
max time kernel
142s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
005123f9506f54c7c8b4571ffdf41be0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
005123f9506f54c7c8b4571ffdf41be0.exe
Resource
win10v2004-20231215-en
General
-
Target
005123f9506f54c7c8b4571ffdf41be0.exe
-
Size
1.8MB
-
MD5
005123f9506f54c7c8b4571ffdf41be0
-
SHA1
535abc3d6f53bd66d456d788dc5d44eb145a2087
-
SHA256
be46a582cb3fc66172d6c18e79c2761d686d9948f2531d4df7a20684ec5e2a9c
-
SHA512
72e30bd76e89b7e28d412c0aa6a71d64bc2e669ef656d469df783a5690ef6e2a50fa2f6d646238405e235a08d3bb2cb7e60b3b469f048375d7d6dbf03cf63563
-
SSDEEP
49152:kFNWjnPLYjpoA9HrZdE1jR9T1+fey25Dz67XwsYv:fjcXHrZO9x+fcsXG
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2416 created 420 2416 005123f9506f54c7c8b4571ffdf41be0.exe 5 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 005123f9506f54c7c8b4571ffdf41be0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 005123f9506f54c7c8b4571ffdf41be0.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 005123f9506f54c7c8b4571ffdf41be0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 005123f9506f54c7c8b4571ffdf41be0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 005123f9506f54c7c8b4571ffdf41be0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 005123f9506f54c7c8b4571ffdf41be0.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Wine 005123f9506f54c7c8b4571ffdf41be0.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2416 005123f9506f54c7c8b4571ffdf41be0.exe 2652 005123f9506f54c7c8b4571ffdf41be0.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2416 005123f9506f54c7c8b4571ffdf41be0.exe 2416 005123f9506f54c7c8b4571ffdf41be0.exe 2416 005123f9506f54c7c8b4571ffdf41be0.exe 2652 005123f9506f54c7c8b4571ffdf41be0.exe 2652 005123f9506f54c7c8b4571ffdf41be0.exe 2652 005123f9506f54c7c8b4571ffdf41be0.exe 2652 005123f9506f54c7c8b4571ffdf41be0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2416 005123f9506f54c7c8b4571ffdf41be0.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2416 005123f9506f54c7c8b4571ffdf41be0.exe 2416 005123f9506f54c7c8b4571ffdf41be0.exe 2652 005123f9506f54c7c8b4571ffdf41be0.exe 2652 005123f9506f54c7c8b4571ffdf41be0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2540 2416 005123f9506f54c7c8b4571ffdf41be0.exe 28 PID 2416 wrote to memory of 2540 2416 005123f9506f54c7c8b4571ffdf41be0.exe 28 PID 2416 wrote to memory of 2540 2416 005123f9506f54c7c8b4571ffdf41be0.exe 28 PID 2416 wrote to memory of 2540 2416 005123f9506f54c7c8b4571ffdf41be0.exe 28 PID 2416 wrote to memory of 2652 2416 005123f9506f54c7c8b4571ffdf41be0.exe 29 PID 2416 wrote to memory of 2652 2416 005123f9506f54c7c8b4571ffdf41be0.exe 29 PID 2416 wrote to memory of 2652 2416 005123f9506f54c7c8b4571ffdf41be0.exe 29 PID 2416 wrote to memory of 2652 2416 005123f9506f54c7c8b4571ffdf41be0.exe 29
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Users\Admin\AppData\Local\Temp\005123f9506f54c7c8b4571ffdf41be0.exeC:\Users\Admin\AppData\Local\Temp\005123f9506f54c7c8b4571ffdf41be0.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\005123f9506f54c7c8b4571ffdf41be0.exe"C:\Users\Admin\AppData\Local\Temp\005123f9506f54c7c8b4571ffdf41be0.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe2⤵PID:2540
-