Analysis

  • max time kernel
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 09:46

General

  • Target

    14e0a4f87f833d3298b4856f1dc14ae0.exe

  • Size

    564KB

  • MD5

    14e0a4f87f833d3298b4856f1dc14ae0

  • SHA1

    a147dbe8f655c0a032699f29c92b749291d74029

  • SHA256

    fc1859f620c59d3e70bb6f7e12ce963afaadae57c20edfff376c89b07f5a50a4

  • SHA512

    747a3d64e89cbc7e7b719851cefd83f4891bb7e55143963e2e413c3a91647537cab0b08d40f5d90b3b48d9be65dc9231833057ce4053ed41ba801d876dc39dd2

  • SSDEEP

    12288:LNr8AzhxTY5O3R4YalsuKni4Lu9oSO4SVomdu3lW:LNrdxTQGzuoSyymdUE

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14e0a4f87f833d3298b4856f1dc14ae0.exe
    "C:\Users\Admin\AppData\Local\Temp\14e0a4f87f833d3298b4856f1dc14ae0.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Loads dropped DLL
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\n1072\s1072.exe
      "C:\Users\Admin\AppData\Local\Temp\n1072\s1072.exe" ins.exe /e 12848026 /u 50d1d9d5-cf90-407c-820a-35e05bc06f2f /h b04302.api.socdn.com /v "C:\Users\Admin\AppData\Local\Temp\14e0a4f87f833d3298b4856f1dc14ae0.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\n1072\s1072.exe

    Filesize

    110KB

    MD5

    223f05356942449465211022ab8ff381

    SHA1

    307bfc7fe8f6b04464f19c052e28d5ffa7826f09

    SHA256

    6265eb541c25cdd8e931e38c8591edc117724162d926f80ff677e9651a4926f2

    SHA512

    b90ea45d06bbcf6a09cef34cee62e616ed2b4a0049ab84b0d42e1db3e5c8e54661dff9f70e78100669f7b59f3afffef9cb2869500a03442115e9f8fbf88939f2

  • C:\Users\Admin\AppData\Local\Temp\n1072\s1072.exe

    Filesize

    101KB

    MD5

    842f64c63dcbcd8ad412839a63239856

    SHA1

    ff2277fadb6eab5d3337af9c1fd0e190784066a7

    SHA256

    29606f49680bef555c5a60718b49c9866f78597d69238676fe15e82322c45c6e

    SHA512

    141f9a68a9a99e87b83306a329de655e57c5df8b530b8b12b6e2715cd03d902652820af00515e82c19560dce37aa71f71ea393607b11e76682a59fc93ab7b85d

  • C:\Users\Admin\AppData\Local\Temp\n1072\s1072.exe

    Filesize

    124KB

    MD5

    4be66bf4ed3b908d01926f586c7822c7

    SHA1

    01ecfac25337014563130f58e3bf9ca1cd751714

    SHA256

    9019d5e73a2898d80b4b007f7b819ade3d7a1815905bcf5db7c49686e7d2028e

    SHA512

    747a887068893a5328d6c026a68a1c343f852dc942f0cc9688942d24593223124c3bb4b037a53f92321de34583b6749eb5bc76b2e6c26d986fd593d4cc7153c3

  • \Users\Admin\AppData\Local\Temp\n1072\s1072.exe

    Filesize

    145KB

    MD5

    6ee62a8f0aa17a47fffb3fc3b4950813

    SHA1

    a106d7a1f0b08b1d92fd797b7a0e2a8869427c4f

    SHA256

    55d2287530c5af24135a464709cf334935980a41c493511f0731c162ddb3c560

    SHA512

    0d8773172036561b5627c7c6632c12e6da3435da92bbb491596856761c2f2b4ffb6724e17f5b9eff3f81316d217f1841772378f8068e0c103728a4dfeac9ef22

  • \Users\Admin\AppData\Local\Temp\n1072\s1072.exe

    Filesize

    113KB

    MD5

    7f0bdc4484cc01ecaafc540781b80585

    SHA1

    e64bea30fec84d5301a34e9d696e50fb6da4b8a2

    SHA256

    787b0fff6fccd69cbc722fcdf551a92fbdb3e36f014dc4f76c46a179b568710f

    SHA512

    57490bf01998454edc3745ceeb3f51849dcfcd199349d104a4dc0e0665f773b11655e0fbc5b647bfbebc2845af30fdcd1fd85d75bbe3c59e8743ec3100ef07b2

  • \Users\Admin\AppData\Local\Temp\n1072\s1072.exe

    Filesize

    411KB

    MD5

    13b0085a03720e67fb8c73db3f14609e

    SHA1

    ddf811f21e6c066b644d03e6751e16efb0fbecce

    SHA256

    f9449897f9ca99b99837ad322c8b6737e7a47e3827b6a4c073c6ca8911d8c340

    SHA512

    39b95dce14b3eea6f191d4dbaaff87ebbc8f3b6982e7b4ee5ebeed83d3b7397441665f25dec5eb9f8a1f3b12f4ddcd604d5852b781f592488263161c0d620e82

  • \Users\Admin\AppData\Local\Temp\n1072\s1072.exe

    Filesize

    186KB

    MD5

    0298eb825a482b99b678b9d9ebe8554a

    SHA1

    6814751bc2e8fb743e1e69b51bbfacbd4f70986e

    SHA256

    7d23bdba123a3efa54d84540d6d29a7e4c9fcf1607f38aa9e0eda1c5672dcb8a

    SHA512

    5b05bfe8b3a40af1b9837a00256c4a3bb86aaaa81671b769dda17bc73bb5b4f297709d279bfdd8de2c6e44b0f3495ef3640bde88450dba32a3d106c2e076e13e

  • memory/2200-77-0x0000000000AE0000-0x0000000000B60000-memory.dmp

    Filesize

    512KB

  • memory/2200-81-0x0000000000AE0000-0x0000000000B60000-memory.dmp

    Filesize

    512KB

  • memory/2200-74-0x0000000000F70000-0x0000000000F7E000-memory.dmp

    Filesize

    56KB

  • memory/2200-75-0x0000000000AE0000-0x0000000000B60000-memory.dmp

    Filesize

    512KB

  • memory/2200-76-0x0000000000AE0000-0x0000000000B60000-memory.dmp

    Filesize

    512KB

  • memory/2200-18-0x0000000000AE0000-0x0000000000B60000-memory.dmp

    Filesize

    512KB

  • memory/2200-78-0x000007FEF5430000-0x000007FEF5DCD000-memory.dmp

    Filesize

    9.6MB

  • memory/2200-79-0x000007FEF5430000-0x000007FEF5DCD000-memory.dmp

    Filesize

    9.6MB

  • memory/2200-82-0x0000000000AE0000-0x0000000000B60000-memory.dmp

    Filesize

    512KB

  • memory/2200-17-0x000007FEF5430000-0x000007FEF5DCD000-memory.dmp

    Filesize

    9.6MB

  • memory/2200-80-0x0000000000AE0000-0x0000000000B60000-memory.dmp

    Filesize

    512KB

  • memory/2200-83-0x0000000000AE0000-0x0000000000B60000-memory.dmp

    Filesize

    512KB

  • memory/2200-84-0x0000000000AE0000-0x0000000000B60000-memory.dmp

    Filesize

    512KB

  • memory/2200-85-0x0000000000AE0000-0x0000000000B60000-memory.dmp

    Filesize

    512KB

  • memory/2200-86-0x0000000000AE0000-0x0000000000B60000-memory.dmp

    Filesize

    512KB

  • memory/2200-88-0x0000000000AE0000-0x0000000000B60000-memory.dmp

    Filesize

    512KB

  • memory/2200-87-0x000007FEF5430000-0x000007FEF5DCD000-memory.dmp

    Filesize

    9.6MB