Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 20:15

General

  • Target

    1040558c7dc87a46be07caf72321cd8e.exe

  • Size

    5.6MB

  • MD5

    1040558c7dc87a46be07caf72321cd8e

  • SHA1

    f41f8d6e736aa0c24e77ee87c54d50a40ff3a406

  • SHA256

    0408bf901d6a03e633db081462569983338e70a6302642ceed9eb856fe19eac0

  • SHA512

    411684a05abee60ac061447116e306bc6b29fd3b9e6979a906d23f3ba1e1e684acf02d756f584995446c3e28211c1ee9237b24277dcfbf8b909cbae38ea48222

  • SSDEEP

    98304:MZWPhbf9FQOnuW5I4rpzjEmy/uvzGz29MQDag:1reW53hWi

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1040558c7dc87a46be07caf72321cd8e.exe
    "C:\Users\Admin\AppData\Local\Temp\1040558c7dc87a46be07caf72321cd8e.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 496
      2⤵
      • Program crash
      PID:1972

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\conf.ini

          Filesize

          5KB

          MD5

          38e8c714f9b1f4447d38cad5c95ef457

          SHA1

          dfba62e37f1575dc2adab8cba7d53d9d39b0269d

          SHA256

          b997aea190db973e7b5a04c3bb7c95f409e71e839165207e3615171c177d02d2

          SHA512

          77ed2ea8c0f5a808dc7ee8ed3b66b9b301886b3f9f766b0882f04bec58e0f60e2526d9b0044b983bfc049ffe58938b128b4ebb973251170a9ca7b6968a856f35

        • memory/2140-16-0x0000000000580000-0x0000000000582000-memory.dmp

          Filesize

          8KB

        • memory/2140-13-0x0000000000E20000-0x0000000000E21000-memory.dmp

          Filesize

          4KB

        • memory/2140-19-0x0000000000A50000-0x0000000000A51000-memory.dmp

          Filesize

          4KB

        • memory/2140-18-0x0000000002900000-0x0000000002901000-memory.dmp

          Filesize

          4KB

        • memory/2140-17-0x0000000002F00000-0x0000000002F01000-memory.dmp

          Filesize

          4KB

        • memory/2140-0-0x0000000000F20000-0x00000000014F6000-memory.dmp

          Filesize

          5.8MB

        • memory/2140-15-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

          Filesize

          4KB

        • memory/2140-9-0x0000000002C70000-0x0000000002C71000-memory.dmp

          Filesize

          4KB

        • memory/2140-10-0x0000000002B00000-0x0000000002B02000-memory.dmp

          Filesize

          8KB

        • memory/2140-12-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

          Filesize

          4KB

        • memory/2140-20-0x0000000002F10000-0x0000000002F11000-memory.dmp

          Filesize

          4KB

        • memory/2140-11-0x0000000002C60000-0x0000000002C61000-memory.dmp

          Filesize

          4KB

        • memory/2140-14-0x0000000000C10000-0x0000000000C11000-memory.dmp

          Filesize

          4KB

        • memory/2140-8-0x0000000000BC0000-0x0000000000BC1000-memory.dmp

          Filesize

          4KB

        • memory/2140-7-0x0000000002A50000-0x0000000002A51000-memory.dmp

          Filesize

          4KB

        • memory/2140-23-0x0000000000F20000-0x00000000014F6000-memory.dmp

          Filesize

          5.8MB

        • memory/2140-24-0x00000000031C0000-0x00000000031C1000-memory.dmp

          Filesize

          4KB

        • memory/2140-1-0x0000000077C90000-0x0000000077C92000-memory.dmp

          Filesize

          8KB

        • memory/2140-25-0x0000000000ED0000-0x0000000000ED1000-memory.dmp

          Filesize

          4KB

        • memory/2140-139-0x0000000000EC0000-0x0000000000EC1000-memory.dmp

          Filesize

          4KB

        • memory/2140-140-0x0000000002AE0000-0x0000000002AE1000-memory.dmp

          Filesize

          4KB

        • memory/2140-141-0x0000000000520000-0x0000000000521000-memory.dmp

          Filesize

          4KB

        • memory/2140-142-0x0000000000F20000-0x00000000014F6000-memory.dmp

          Filesize

          5.8MB