Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 20:15
Static task
static1
Behavioral task
behavioral1
Sample
1040558c7dc87a46be07caf72321cd8e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1040558c7dc87a46be07caf72321cd8e.exe
Resource
win10v2004-20231215-en
General
-
Target
1040558c7dc87a46be07caf72321cd8e.exe
-
Size
5.6MB
-
MD5
1040558c7dc87a46be07caf72321cd8e
-
SHA1
f41f8d6e736aa0c24e77ee87c54d50a40ff3a406
-
SHA256
0408bf901d6a03e633db081462569983338e70a6302642ceed9eb856fe19eac0
-
SHA512
411684a05abee60ac061447116e306bc6b29fd3b9e6979a906d23f3ba1e1e684acf02d756f584995446c3e28211c1ee9237b24277dcfbf8b909cbae38ea48222
-
SSDEEP
98304:MZWPhbf9FQOnuW5I4rpzjEmy/uvzGz29MQDag:1reW53hWi
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1040558c7dc87a46be07caf72321cd8e.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1040558c7dc87a46be07caf72321cd8e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1040558c7dc87a46be07caf72321cd8e.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Wine 1040558c7dc87a46be07caf72321cd8e.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2140 1040558c7dc87a46be07caf72321cd8e.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Fonts.Lists 1040558c7dc87a46be07caf72321cd8e.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1972 2140 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2140 1040558c7dc87a46be07caf72321cd8e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 1972 2140 1040558c7dc87a46be07caf72321cd8e.exe 28 PID 2140 wrote to memory of 1972 2140 1040558c7dc87a46be07caf72321cd8e.exe 28 PID 2140 wrote to memory of 1972 2140 1040558c7dc87a46be07caf72321cd8e.exe 28 PID 2140 wrote to memory of 1972 2140 1040558c7dc87a46be07caf72321cd8e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1040558c7dc87a46be07caf72321cd8e.exe"C:\Users\Admin\AppData\Local\Temp\1040558c7dc87a46be07caf72321cd8e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 4962⤵
- Program crash
PID:1972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD538e8c714f9b1f4447d38cad5c95ef457
SHA1dfba62e37f1575dc2adab8cba7d53d9d39b0269d
SHA256b997aea190db973e7b5a04c3bb7c95f409e71e839165207e3615171c177d02d2
SHA51277ed2ea8c0f5a808dc7ee8ed3b66b9b301886b3f9f766b0882f04bec58e0f60e2526d9b0044b983bfc049ffe58938b128b4ebb973251170a9ca7b6968a856f35