Analysis
-
max time kernel
202s -
max time network
221s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 18:39
Behavioral task
behavioral1
Sample
00b971d443106183dbe2308cff654e3c.exe
Resource
win7-20231215-en
General
-
Target
00b971d443106183dbe2308cff654e3c.exe
-
Size
3.9MB
-
MD5
00b971d443106183dbe2308cff654e3c
-
SHA1
0948366ce35772c9597b103ef1f7e00cef10c9f1
-
SHA256
cc799dd39fb2eb445a2a18f0b391128c80a4cea750c431285c51e01f9c3a63ca
-
SHA512
c25307c259a9ae58005474e03faaa27c341ba22912457320208f6637546f413a2d4a623125e656d3ee8d5d8e54c809fc45920bf69a3ac58d9deac437ebc3516f
-
SSDEEP
98304:ocF1n/O0N9bT4NW5xbrdsG2h03FkBA8xtvLsESNL5Hvx1:oc3OU+YH1sWmBA8PL2L5H5
Malware Config
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 00b971d443106183dbe2308cff654e3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse 00b971d443106183dbe2308cff654e3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService 00b971d443106183dbe2308cff654e3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 00b971d443106183dbe2308cff654e3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo 00b971d443106183dbe2308cff654e3c.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 00b971d443106183dbe2308cff654e3c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ 00b971d443106183dbe2308cff654e3c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ 00b971d443106183dbe2308cff654e3c.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions 00b971d443106183dbe2308cff654e3c.exe -
Drops file in Drivers directory 10 IoCs
description ioc Process File created C:\Windows\system32\drivers\ADNetKernel3.sys 00b971d443106183dbe2308cff654e3c.exe File created C:\Windows\system32\drivers\cem1z1pd55986.sys 00b971d443106183dbe2308cff654e3c.exe File created C:\Windows\system32\drivers\m36s55zr212t6o99.sys 00b971d443106183dbe2308cff654e3c.exe File created C:\Windows\system32\drivers\ADNetKernel.sys 00b971d443106183dbe2308cff654e3c.exe File created C:\Windows\system32\drivers\ADNetKernel2.sys 00b971d443106183dbe2308cff654e3c.exe File created C:\Windows\system32\drivers\ADNetKernel5.sys 00b971d443106183dbe2308cff654e3c.exe File created C:\Windows\system32\drivers\cem1z1pd55987.sys 00b971d443106183dbe2308cff654e3c.exe File created C:\Windows\system32\drivers\m36s55zr212t6o98.sys 00b971d443106183dbe2308cff654e3c.exe File created C:\Windows\system32\drivers\ADNetKernel1.sys 00b971d443106183dbe2308cff654e3c.exe File created C:\Windows\system32\drivers\ADNetKernel4.sys 00b971d443106183dbe2308cff654e3c.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 00b971d443106183dbe2308cff654e3c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 00b971d443106183dbe2308cff654e3c.exe -
Executes dropped EXE 2 IoCs
pid Process 3236 ADBlockSvc.exe 848 ADBlockSvc.exe -
resource yara_rule behavioral2/memory/3564-0-0x0000000000090000-0x000000000086F000-memory.dmp upx behavioral2/memory/3564-1-0x0000000000090000-0x000000000086F000-memory.dmp upx behavioral2/memory/3564-3-0x0000000000090000-0x000000000086F000-memory.dmp upx behavioral2/memory/3564-30-0x0000000000090000-0x000000000086F000-memory.dmp upx -
Checks system information in the registry 2 TTPs 1 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName 00b971d443106183dbe2308cff654e3c.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 00b971d443106183dbe2308cff654e3c.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{12BF553C-05A5-4C65-8123-4CAE8A9C5C2A}\1.0 ADBlockSvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{12BF553C-05A5-4C65-8123-4CAE8A9C5C2A}\1.0\0 ADBlockSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{12BF553C-05A5-4C65-8123-4CAE8A9C5C2A}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Roaming\\ADBlock\\AppData\\ADBlockSvc.exe" ADBlockSvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{5F487BAE-13E0-4762-B64A-ED5154D2A4AB} ADBlockSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{5F487BAE-13E0-4762-B64A-ED5154D2A4AB}\LocalService = "ADBlockSvcV2" ADBlockSvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{12BF553C-05A5-4C65-8123-4CAE8A9C5C2A} ADBlockSvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{12BF553C-05A5-4C65-8123-4CAE8A9C5C2A}\1.0\0\win32 ADBlockSvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{12BF553C-05A5-4C65-8123-4CAE8A9C5C2A}\1.0\HELPDIR ADBlockSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{12BF553C-05A5-4C65-8123-4CAE8A9C5C2A}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Roaming\\ADBlock\\AppData" ADBlockSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{12BF553C-05A5-4C65-8123-4CAE8A9C5C2A}\1.0\ = "ADBlockSvcLib" ADBlockSvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{12BF553C-05A5-4C65-8123-4CAE8A9C5C2A}\1.0\FLAGS ADBlockSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{12BF553C-05A5-4C65-8123-4CAE8A9C5C2A}\1.0\FLAGS\ = "0" ADBlockSvc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3564 00b971d443106183dbe2308cff654e3c.exe 3564 00b971d443106183dbe2308cff654e3c.exe 3564 00b971d443106183dbe2308cff654e3c.exe 3564 00b971d443106183dbe2308cff654e3c.exe 848 ADBlockSvc.exe 848 ADBlockSvc.exe -
Suspicious behavior: LoadsDriver 10 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 848 ADBlockSvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3564 wrote to memory of 3236 3564 00b971d443106183dbe2308cff654e3c.exe 94 PID 3564 wrote to memory of 3236 3564 00b971d443106183dbe2308cff654e3c.exe 94 PID 3564 wrote to memory of 3236 3564 00b971d443106183dbe2308cff654e3c.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\00b971d443106183dbe2308cff654e3c.exe"C:\Users\Admin\AppData\Local\Temp\00b971d443106183dbe2308cff654e3c.exe"1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Drops file in Drivers directory
- Checks BIOS information in registry
- Checks system information in the registry
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Roaming\ADBlock\AppData\ADBlockSvc.exe"C:\Users\Admin\AppData\Roaming\ADBlock\AppData\ADBlockSvc.exe" -Service2⤵
- Executes dropped EXE
- Modifies registry class
PID:3236
-
-
C:\Users\Admin\AppData\Roaming\ADBlock\AppData\ADBlockSvc.exe"C:\Users\Admin\AppData\Roaming\ADBlock\AppData\ADBlockSvc.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149KB
MD583b89f9eeefd19d65d8d9f9cd24514df
SHA1701e49832e8057a53e0e371761e5e65b67ecadc3
SHA256a3975b18bd0e85db2e39f9252c1f83d04ed37869932326cf41a02158a051ba2e
SHA51241a6c201d1ed93aadcfdc8cb8aa1e920dc98a592a233ad6730f185f4274b021ef0afe3853ba18889dfa3e38ae36b648b2e5631147266ff4da9312ee5edc7413d
-
Filesize
112B
MD5279d819f0bb248ceda8bb55b91153b4f
SHA139d7ce6d55fed8e41ce760ce7268b35d5f863534
SHA256c0942cb5ba14d1112a69771a9b1c50c2c93f259dcc6cf7e3fb6856d49770d173
SHA5124995dd660d77ffec5ddf4272f63b147244f86b5d5d9b829c69a6668969f5eb1b0f71776b98a762372690fcff44022b22868a0f28355a56cf1d41a826f1681204
-
Filesize
50KB
MD54e744187308af0d000038beb1d8586ea
SHA11f5904fe4a12850b0a93d2b46b39303424180252
SHA2563393e2a296bcbb2c25f129bbaabc4db4a7d71bfe0995f2ee515d3443247a2aff
SHA51270531db5acfb4a58dd6e212065bed165e001da7364a835db2d4ceeb7bbd8aa89ef0c8867e9c1c0802f53da47f2084a988deff15ae1b846a1ecdc8834ecbde6b5