Analysis
-
max time kernel
0s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
0f423229f1a869f490e8f9e84fbb7afb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f423229f1a869f490e8f9e84fbb7afb.exe
Resource
win10v2004-20231222-en
General
-
Target
0f423229f1a869f490e8f9e84fbb7afb.exe
-
Size
500KB
-
MD5
0f423229f1a869f490e8f9e84fbb7afb
-
SHA1
68ebd87a48250318100d4bdaff83a9c3a08b92fa
-
SHA256
162e566a94f724a08647a8f0f42c0ad635d3bffaff976b32ab38d4202e637c7d
-
SHA512
9c0b077a070429779db322417f4ab9442e9385c241c2748e0d37cdbd3b88729c123feea141dd53806823a50ca53e7ed6b40958f2780e30c26d1e07ff0aca719f
-
SSDEEP
6144:z5DK99xOtO8XMLOjyfdGdQK36OP9KEzmIr3JgYhCOPoKuRbdz5C241cOInPfnGfA:z5Dc3x8XPjy07n1C4uASOIP/so
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0f423229f1a869f490e8f9e84fbb7afb.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 0f423229f1a869f490e8f9e84fbb7afb.exe -
Executes dropped EXE 1 IoCs
pid Process 5780 s640.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4564 3880 WerFault.exe 82 -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 0f423229f1a869f490e8f9e84fbb7afb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 0f423229f1a869f490e8f9e84fbb7afb.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3880 0f423229f1a869f490e8f9e84fbb7afb.exe 3880 0f423229f1a869f490e8f9e84fbb7afb.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3880 wrote to memory of 5780 3880 0f423229f1a869f490e8f9e84fbb7afb.exe 91 PID 3880 wrote to memory of 5780 3880 0f423229f1a869f490e8f9e84fbb7afb.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f423229f1a869f490e8f9e84fbb7afb.exe"C:\Users\Admin\AppData\Local\Temp\0f423229f1a869f490e8f9e84fbb7afb.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks computer location settings
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\n640\s640.exe"C:\Users\Admin\AppData\Local\Temp\n640\s640.exe" ins.exe /h a46af.api.socdn.com /u e79b5525-92fa-11e3-8a58-80c16e6f498c /e 12909069 /t 53abfb15561ca38c138b48ee /v "C:\Users\Admin\AppData\Local\Temp\0f423229f1a869f490e8f9e84fbb7afb.exe"2⤵
- Executes dropped EXE
PID:5780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 44442⤵
- Program crash
PID:4564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3880 -ip 38801⤵PID:4912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
286KB
MD53e3ab97a3be5f358ef2410034ca1d11e
SHA1132b2d344871a59eea8cd45dcb289f880754de0a
SHA2569343341db998236ead9f7bc0847747fb92cc90cc4709e7b6ff4c2ff6809dd1bb
SHA51231cae25593341fe970dce4532449af639fb4b05a91591c1a22a8be52e2d9937439ef2a73e87cc49e636d24d3c5986a5d1954e9736046da4adbb7ac9857d9e48d
-
Filesize
59KB
MD5d31bca1e3acfdb561ff75b8d98ed3865
SHA1055fbb06e9766a793668a9cdee8b1bd1aeac11fd
SHA2560d220102aa372ddcfdd6735a6f311c14bf91fa23aab33df0f02ad5d4ef0f6f67
SHA512c3ebfe6de4f6ade5e088c99af8b9678ffdf3b76e4aca7cb092436fbeb58eb7f4070bb5e9209096d876d39b26d872d538995e0f78a2cc47d6fdc1c2be6ecbe8fb