Analysis

  • max time kernel
    25s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 20:15

General

  • Target

    1040558c7dc87a46be07caf72321cd8e.exe

  • Size

    5.6MB

  • MD5

    1040558c7dc87a46be07caf72321cd8e

  • SHA1

    f41f8d6e736aa0c24e77ee87c54d50a40ff3a406

  • SHA256

    0408bf901d6a03e633db081462569983338e70a6302642ceed9eb856fe19eac0

  • SHA512

    411684a05abee60ac061447116e306bc6b29fd3b9e6979a906d23f3ba1e1e684acf02d756f584995446c3e28211c1ee9237b24277dcfbf8b909cbae38ea48222

  • SSDEEP

    98304:MZWPhbf9FQOnuW5I4rpzjEmy/uvzGz29MQDag:1reW53hWi

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1040558c7dc87a46be07caf72321cd8e.exe
    "C:\Users\Admin\AppData\Local\Temp\1040558c7dc87a46be07caf72321cd8e.exe"
    1⤵
    • UAC bypass
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Windows security modification
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Checks processor information in registry
    • Modifies Internet Explorer Phishing Filter
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:5068
    • C:\Windows\SysWOW64\sc.exe
      sc stop WinDefend
      2⤵
      • Launches sc.exe
      PID:4588
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Windows\PLA\userfsp.exe"
      2⤵
        PID:912
      • C:\Windows\SysWOW64\net.exe
        net stop windefend
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2720
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 stop windefend
      1⤵
        PID:1816
      • C:\Windows\PLA\userfsp.exe
        C:\Windows\PLA\userfsp.exe
        1⤵
          PID:3124

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\Temp1040558c7dc87a46be07caf72321cd8e.exe

                Filesize

                305KB

                MD5

                3fd304b618315229d03f0776bfcc677b

                SHA1

                c2734049858c7a2bbc3673abfe0e88281e773764

                SHA256

                bc436b325baaabc043ccdc22fd7803e81c6d0c732579144ade4d9286b8b05523

                SHA512

                4ad95197d3fd51bd6570de36670f2a9a1dddb710143ff9cbbc46043668c9318a27284a46836f3674b78e4b72cf99f0181cde60cfde6bccf9d3450a6a3b0ba93b

              • C:\Users\Admin\AppData\Local\Temp\conf.ini

                Filesize

                5KB

                MD5

                38e8c714f9b1f4447d38cad5c95ef457

                SHA1

                dfba62e37f1575dc2adab8cba7d53d9d39b0269d

                SHA256

                b997aea190db973e7b5a04c3bb7c95f409e71e839165207e3615171c177d02d2

                SHA512

                77ed2ea8c0f5a808dc7ee8ed3b66b9b301886b3f9f766b0882f04bec58e0f60e2526d9b0044b983bfc049ffe58938b128b4ebb973251170a9ca7b6968a856f35

              • C:\Users\Admin\AppData\Local\Temp\conf.ini

                Filesize

                5KB

                MD5

                5d8d43d5c5113d1d614752c04d5fc223

                SHA1

                65e5cbcad3a0de4a52e6cc2019214f8e1bcc5921

                SHA256

                4d4e7dee73ada611c12307113685fa3afd32d25c0babc9cc3d3631fa0384988d

                SHA512

                fb670c7b0e8618e2df247704d53b1d05bb89cad481ffaa20fe02f4e6dbf09ff90455278dd74c248435f81a573c353c9f11f14b6533c48cce31e1a5ddd9308e87

              • C:\Windows\PLA\userfsp.exe

                Filesize

                222KB

                MD5

                373913481ffcb9f1e9bee1c5688651a7

                SHA1

                e8628625fc158c86d6b276900b14eaaab1adfdf8

                SHA256

                3ae18edf46e064c5e4f8b524c82ad45c0feab77342bd4b6b14b7fbf156e85a0b

                SHA512

                837e7aed96875b2f1d135a5598a54ca8e80b5c08b12ab53e3138cc29c1a1d57e5003313651b3d564f0b3343fc7b87852671e03be56ceb648833614184081d6e5

              • C:\Windows\System32\hpim.dll

                Filesize

                101KB

                MD5

                a1041dcd2d6083cf521a59a643942ba8

                SHA1

                d6f2fb54393126c83056d9574e23fe35d089f10d

                SHA256

                12a0862eda4a3c1728eb2da6b670a6dba2a92764358df627a379444bc7ecc174

                SHA512

                5f94c6cad7ab1dfd38fd3f1baa4c49a50aace5edab279ac91d5e50bf967c62b1cb2a014aa21de5d4c8bec3e424efbc6f278a020ba432044707608d94981acc6a

              • C:\Windows\System32\hpis.dll

                Filesize

                546KB

                MD5

                5af07ca51679560d1adb90c21da07e78

                SHA1

                cea23c935c2bad078106c1d6a33b91c8eec09143

                SHA256

                03443df04318bd7b3e30e829655d5e8477ac946973258c049ab9bce5a1b2b239

                SHA512

                5da132ff5334250adcdc64f369f8f5d81805945f89a74df6141481aab0ac4f9d12b256b30fb48b772d35874576d6f5296680eff31aaba20642c3f37ca85d6b53

              • C:\Windows\System32\hpis.dll

                Filesize

                1.2MB

                MD5

                ad93fe201f783d5edde66a4ac0a2532a

                SHA1

                934e4ea8c15a0e9179abd1abef983ac0fccdb65d

                SHA256

                32603b1002fcf059038d954a9bdea6dd306c1fda2679e2245f3c6178b3400638

                SHA512

                f1ec11fb4738878ef53808f3f51a245ae42ffb7e25b67d9493d0e2e14b43d260c0fec3816752924f8e9d0e17da05ffba57ad8c0ed4400c5bd4a01feb1b2150f6

              • C:\Windows\system32\hpis.dll

                Filesize

                1.3MB

                MD5

                d8f58c75e0380c2c4adfe26037ea1443

                SHA1

                ee8bcc3e31f31141f022ba60ec833ff26dbcc8df

                SHA256

                1c545589e5e296c31eda172a3686071f680afade2424aa0cbc5d1f9bbb56d402

                SHA512

                6652a2f0d4d2e82b8f33487e28de36be515b3378cc59bb0be89dde3268583cd69d61c8710406aa80e645678542840d479d27ab9ea58646861e8db8ccce4b8e11

              • memory/3124-173-0x00007FFA1BAA0000-0x00007FFA1C057000-memory.dmp

                Filesize

                5.7MB

              • memory/3124-168-0x00007FFA1BAA0000-0x00007FFA1C057000-memory.dmp

                Filesize

                5.7MB

              • memory/3124-189-0x00007FFA1BAA0000-0x00007FFA1C057000-memory.dmp

                Filesize

                5.7MB

              • memory/3124-185-0x00007FFA1BAA0000-0x00007FFA1C057000-memory.dmp

                Filesize

                5.7MB

              • memory/3124-182-0x00007FFA1BAA0000-0x00007FFA1C057000-memory.dmp

                Filesize

                5.7MB

              • memory/3124-178-0x00007FFA1BAA0000-0x00007FFA1C057000-memory.dmp

                Filesize

                5.7MB

              • memory/3124-174-0x00007FFA3AB90000-0x00007FFA3AD85000-memory.dmp

                Filesize

                2.0MB

              • memory/3124-201-0x00007FFA1BAA0000-0x00007FFA1C057000-memory.dmp

                Filesize

                5.7MB

              • memory/3124-172-0x00007FFA1BAA0000-0x00007FFA1C057000-memory.dmp

                Filesize

                5.7MB

              • memory/3124-207-0x00007FFA1BAA0000-0x00007FFA1C057000-memory.dmp

                Filesize

                5.7MB

              • memory/3124-193-0x00007FFA1BAA0000-0x00007FFA1C057000-memory.dmp

                Filesize

                5.7MB

              • memory/3124-205-0x00007FFA1BAA0000-0x00007FFA1C057000-memory.dmp

                Filesize

                5.7MB

              • memory/3124-158-0x00007FFA3AB90000-0x00007FFA3AD85000-memory.dmp

                Filesize

                2.0MB

              • memory/3124-197-0x00007FFA1BAA0000-0x00007FFA1C057000-memory.dmp

                Filesize

                5.7MB

              • memory/3124-162-0x00007FFA3AB90000-0x00007FFA3AD85000-memory.dmp

                Filesize

                2.0MB

              • memory/3124-163-0x00007FFA3AB80000-0x00007FFA3AB90000-memory.dmp

                Filesize

                64KB

              • memory/3124-164-0x00007FFA3AB90000-0x00007FFA3AD85000-memory.dmp

                Filesize

                2.0MB

              • memory/3124-211-0x00007FFA1BAA0000-0x00007FFA1C057000-memory.dmp

                Filesize

                5.7MB

              • memory/3124-160-0x00007FFA3AB80000-0x00007FFA3AB90000-memory.dmp

                Filesize

                64KB

              • memory/3124-157-0x00007FFA1BAA0000-0x00007FFA1C057000-memory.dmp

                Filesize

                5.7MB

              • memory/5068-6-0x0000000004C40000-0x0000000004C41000-memory.dmp

                Filesize

                4KB

              • memory/5068-10-0x0000000004C60000-0x0000000004C61000-memory.dmp

                Filesize

                4KB

              • memory/5068-145-0x0000000004BB0000-0x0000000004BB1000-memory.dmp

                Filesize

                4KB

              • memory/5068-150-0x0000000004B80000-0x0000000004B81000-memory.dmp

                Filesize

                4KB

              • memory/5068-144-0x0000000000110000-0x00000000006E6000-memory.dmp

                Filesize

                5.8MB

              • memory/5068-143-0x0000000000110000-0x00000000006E6000-memory.dmp

                Filesize

                5.8MB

              • memory/5068-142-0x0000000000110000-0x00000000006E6000-memory.dmp

                Filesize

                5.8MB

              • memory/5068-2-0x0000000004C20000-0x0000000004C21000-memory.dmp

                Filesize

                4KB

              • memory/5068-3-0x0000000004BE0000-0x0000000004BE1000-memory.dmp

                Filesize

                4KB

              • memory/5068-165-0x0000000000110000-0x00000000006E6000-memory.dmp

                Filesize

                5.8MB

              • memory/5068-4-0x0000000004C50000-0x0000000004C51000-memory.dmp

                Filesize

                4KB

              • memory/5068-5-0x0000000004C30000-0x0000000004C32000-memory.dmp

                Filesize

                8KB

              • memory/5068-171-0x0000000000110000-0x00000000006E6000-memory.dmp

                Filesize

                5.8MB

              • memory/5068-0-0x0000000000110000-0x00000000006E6000-memory.dmp

                Filesize

                5.8MB

              • memory/5068-7-0x0000000004BC0000-0x0000000004BC1000-memory.dmp

                Filesize

                4KB

              • memory/5068-8-0x0000000004C00000-0x0000000004C01000-memory.dmp

                Filesize

                4KB

              • memory/5068-175-0x0000000000110000-0x00000000006E6000-memory.dmp

                Filesize

                5.8MB

              • memory/5068-9-0x0000000004B50000-0x0000000004B51000-memory.dmp

                Filesize

                4KB

              • memory/5068-179-0x0000000000110000-0x00000000006E6000-memory.dmp

                Filesize

                5.8MB

              • memory/5068-149-0x0000000004B70000-0x0000000004B71000-memory.dmp

                Filesize

                4KB

              • memory/5068-183-0x0000000004B60000-0x0000000004B61000-memory.dmp

                Filesize

                4KB

              • memory/5068-184-0x0000000000110000-0x00000000006E6000-memory.dmp

                Filesize

                5.8MB

              • memory/5068-11-0x0000000004BA0000-0x0000000004BA1000-memory.dmp

                Filesize

                4KB

              • memory/5068-188-0x0000000000110000-0x00000000006E6000-memory.dmp

                Filesize

                5.8MB

              • memory/5068-22-0x0000000004C10000-0x0000000004C11000-memory.dmp

                Filesize

                4KB

              • memory/5068-21-0x0000000004CE0000-0x0000000004CE1000-memory.dmp

                Filesize

                4KB

              • memory/5068-192-0x0000000000110000-0x00000000006E6000-memory.dmp

                Filesize

                5.8MB

              • memory/5068-103-0x0000000004B30000-0x0000000004B31000-memory.dmp

                Filesize

                4KB

              • memory/5068-196-0x0000000000110000-0x00000000006E6000-memory.dmp

                Filesize

                5.8MB

              • memory/5068-139-0x0000000004B40000-0x0000000004B41000-memory.dmp

                Filesize

                4KB

              • memory/5068-200-0x0000000000110000-0x00000000006E6000-memory.dmp

                Filesize

                5.8MB

              • memory/5068-23-0x0000000004BD0000-0x0000000004BD1000-memory.dmp

                Filesize

                4KB

              • memory/5068-202-0x0000000000110000-0x00000000006E6000-memory.dmp

                Filesize

                5.8MB

              • memory/5068-20-0x0000000000110000-0x00000000006E6000-memory.dmp

                Filesize

                5.8MB

              • memory/5068-206-0x0000000000110000-0x00000000006E6000-memory.dmp

                Filesize

                5.8MB

              • memory/5068-12-0x0000000004C70000-0x0000000004C71000-memory.dmp

                Filesize

                4KB

              • memory/5068-210-0x0000000000110000-0x00000000006E6000-memory.dmp

                Filesize

                5.8MB

              • memory/5068-1-0x0000000077B04000-0x0000000077B06000-memory.dmp

                Filesize

                8KB