Analysis

  • max time kernel
    142s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 14:18

General

  • Target

    005123f9506f54c7c8b4571ffdf41be0.exe

  • Size

    1.8MB

  • MD5

    005123f9506f54c7c8b4571ffdf41be0

  • SHA1

    535abc3d6f53bd66d456d788dc5d44eb145a2087

  • SHA256

    be46a582cb3fc66172d6c18e79c2761d686d9948f2531d4df7a20684ec5e2a9c

  • SHA512

    72e30bd76e89b7e28d412c0aa6a71d64bc2e669ef656d469df783a5690ef6e2a50fa2f6d646238405e235a08d3bb2cb7e60b3b469f048375d7d6dbf03cf63563

  • SSDEEP

    49152:kFNWjnPLYjpoA9HrZdE1jR9T1+fey25Dz67XwsYv:fjcXHrZO9x+fcsXG

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:420
      • C:\Users\Admin\AppData\Local\Temp\005123f9506f54c7c8b4571ffdf41be0.exe
        C:\Users\Admin\AppData\Local\Temp\005123f9506f54c7c8b4571ffdf41be0.exe
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2652
    • C:\Users\Admin\AppData\Local\Temp\005123f9506f54c7c8b4571ffdf41be0.exe
      "C:\Users\Admin\AppData\Local\Temp\005123f9506f54c7c8b4571ffdf41be0.exe"
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2416
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\System32\cmd.exe
        2⤵
          PID:2540

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2416-0-0x0000000000400000-0x00000000008BC000-memory.dmp

        Filesize

        4.7MB

      • memory/2416-1-0x0000000077740000-0x0000000077742000-memory.dmp

        Filesize

        8KB

      • memory/2416-2-0x00000000042B0000-0x00000000042B1000-memory.dmp

        Filesize

        4KB

      • memory/2416-3-0x00000000042E0000-0x00000000042E2000-memory.dmp

        Filesize

        8KB

      • memory/2416-5-0x0000000004350000-0x0000000004351000-memory.dmp

        Filesize

        4KB

      • memory/2416-4-0x00000000044D0000-0x00000000044D1000-memory.dmp

        Filesize

        4KB

      • memory/2416-6-0x00000000042C0000-0x00000000042C1000-memory.dmp

        Filesize

        4KB

      • memory/2416-8-0x00000000042D0000-0x00000000042D1000-memory.dmp

        Filesize

        4KB

      • memory/2416-7-0x0000000004330000-0x0000000004331000-memory.dmp

        Filesize

        4KB

      • memory/2416-9-0x00000000044F0000-0x00000000044F1000-memory.dmp

        Filesize

        4KB

      • memory/2416-10-0x00000000042F0000-0x00000000042F1000-memory.dmp

        Filesize

        4KB

      • memory/2416-11-0x0000000004300000-0x0000000004301000-memory.dmp

        Filesize

        4KB

      • memory/2416-13-0x0000000004500000-0x0000000004501000-memory.dmp

        Filesize

        4KB

      • memory/2416-12-0x00000000044E0000-0x00000000044E1000-memory.dmp

        Filesize

        4KB

      • memory/2416-14-0x0000000000400000-0x00000000008BC000-memory.dmp

        Filesize

        4.7MB

      • memory/2416-15-0x0000000004510000-0x0000000004511000-memory.dmp

        Filesize

        4KB

      • memory/2416-16-0x00000000044C0000-0x00000000044C1000-memory.dmp

        Filesize

        4KB

      • memory/2416-18-0x0000000000400000-0x00000000008BC000-memory.dmp

        Filesize

        4.7MB

      • memory/2416-17-0x0000000004700000-0x0000000004702000-memory.dmp

        Filesize

        8KB

      • memory/2652-19-0x0000000000400000-0x00000000008BC000-memory.dmp

        Filesize

        4.7MB

      • memory/2652-21-0x0000000004420000-0x0000000004422000-memory.dmp

        Filesize

        8KB

      • memory/2652-20-0x00000000042B0000-0x00000000042B1000-memory.dmp

        Filesize

        4KB

      • memory/2652-22-0x00000000044C0000-0x00000000044C1000-memory.dmp

        Filesize

        4KB

      • memory/2652-24-0x0000000004400000-0x0000000004401000-memory.dmp

        Filesize

        4KB

      • memory/2652-23-0x0000000004490000-0x0000000004491000-memory.dmp

        Filesize

        4KB

      • memory/2652-26-0x0000000004410000-0x0000000004411000-memory.dmp

        Filesize

        4KB

      • memory/2652-25-0x0000000004470000-0x0000000004471000-memory.dmp

        Filesize

        4KB

      • memory/2652-28-0x0000000004430000-0x0000000004431000-memory.dmp

        Filesize

        4KB

      • memory/2652-27-0x00000000044F0000-0x00000000044F1000-memory.dmp

        Filesize

        4KB

      • memory/2652-31-0x00000000044E0000-0x00000000044E1000-memory.dmp

        Filesize

        4KB

      • memory/2652-32-0x0000000004500000-0x0000000004501000-memory.dmp

        Filesize

        4KB

      • memory/2652-29-0x0000000004440000-0x0000000004441000-memory.dmp

        Filesize

        4KB

      • memory/2652-30-0x0000000004520000-0x0000000004521000-memory.dmp

        Filesize

        4KB

      • memory/2652-33-0x0000000000400000-0x00000000008BC000-memory.dmp

        Filesize

        4.7MB

      • memory/2652-34-0x00000000044D0000-0x00000000044D1000-memory.dmp

        Filesize

        4KB

      • memory/2652-35-0x0000000004510000-0x0000000004511000-memory.dmp

        Filesize

        4KB

      • memory/2652-37-0x00000000045B0000-0x00000000045B1000-memory.dmp

        Filesize

        4KB

      • memory/2652-36-0x00000000045A0000-0x00000000045A1000-memory.dmp

        Filesize

        4KB

      • memory/2652-39-0x0000000004450000-0x0000000004451000-memory.dmp

        Filesize

        4KB

      • memory/2652-38-0x0000000004580000-0x0000000004581000-memory.dmp

        Filesize

        4KB

      • memory/2652-40-0x00000000044B0000-0x00000000044B1000-memory.dmp

        Filesize

        4KB

      • memory/2652-41-0x00000000044A0000-0x00000000044A1000-memory.dmp

        Filesize

        4KB

      • memory/2652-42-0x00000000045C0000-0x00000000045C1000-memory.dmp

        Filesize

        4KB

      • memory/2652-43-0x0000000004590000-0x0000000004591000-memory.dmp

        Filesize

        4KB

      • memory/2652-45-0x0000000004540000-0x0000000004541000-memory.dmp

        Filesize

        4KB

      • memory/2652-44-0x0000000004570000-0x0000000004571000-memory.dmp

        Filesize

        4KB

      • memory/2652-46-0x0000000000400000-0x00000000008BC000-memory.dmp

        Filesize

        4.7MB

      • memory/2652-47-0x0000000000400000-0x00000000008BC000-memory.dmp

        Filesize

        4.7MB

      • memory/2652-48-0x0000000000400000-0x00000000008BC000-memory.dmp

        Filesize

        4.7MB

      • memory/2652-49-0x0000000000400000-0x00000000008BC000-memory.dmp

        Filesize

        4.7MB

      • memory/2652-50-0x0000000000400000-0x00000000008BC000-memory.dmp

        Filesize

        4.7MB

      • memory/2652-51-0x0000000000400000-0x00000000008BC000-memory.dmp

        Filesize

        4.7MB

      • memory/2652-52-0x0000000000400000-0x00000000008BC000-memory.dmp

        Filesize

        4.7MB

      • memory/2652-53-0x0000000000400000-0x00000000008BC000-memory.dmp

        Filesize

        4.7MB

      • memory/2652-54-0x0000000000400000-0x00000000008BC000-memory.dmp

        Filesize

        4.7MB

      • memory/2652-55-0x0000000000400000-0x00000000008BC000-memory.dmp

        Filesize

        4.7MB

      • memory/2652-56-0x0000000000400000-0x00000000008BC000-memory.dmp

        Filesize

        4.7MB

      • memory/2652-57-0x0000000000400000-0x00000000008BC000-memory.dmp

        Filesize

        4.7MB

      • memory/2652-58-0x0000000000400000-0x00000000008BC000-memory.dmp

        Filesize

        4.7MB

      • memory/2652-59-0x0000000000400000-0x00000000008BC000-memory.dmp

        Filesize

        4.7MB