Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
1835631eb68dbd1c381cbd529d905e9d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1835631eb68dbd1c381cbd529d905e9d.exe
Resource
win10v2004-20231222-en
General
-
Target
1835631eb68dbd1c381cbd529d905e9d.exe
-
Size
3.6MB
-
MD5
1835631eb68dbd1c381cbd529d905e9d
-
SHA1
ce648af696fda947c000e4ff4ed42275c4bfc739
-
SHA256
69935b8bfd987db18e288f6cff43025dd0a8bb1eb27f5b6680f8ba2d623f2f41
-
SHA512
2c4bea4262fd03b1e32c46c61d4e7b9ece5d9c7e908b97b55f2ef3655da33f35d5a46ef45394d302fd0e9a3a948f1ce676dd074558a2130f86116a01e55ac4b7
-
SSDEEP
98304:8Mud3bhw4eD82hfeD4fhloc7CiZPCD7/94sTC:8Rrm4ew2Uyzoc7x6dG
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1835631eb68dbd1c381cbd529d905e9d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WinDef.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1835631eb68dbd1c381cbd529d905e9d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1835631eb68dbd1c381cbd529d905e9d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WinDef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WinDef.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WinDef.lnk 1835631eb68dbd1c381cbd529d905e9d.exe -
Executes dropped EXE 1 IoCs
pid Process 460 WinDef.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Wine 1835631eb68dbd1c381cbd529d905e9d.exe Key opened \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Wine WinDef.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3880 1835631eb68dbd1c381cbd529d905e9d.exe 460 WinDef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 460 WinDef.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3880 1835631eb68dbd1c381cbd529d905e9d.exe 3880 1835631eb68dbd1c381cbd529d905e9d.exe 460 WinDef.exe 460 WinDef.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3880 wrote to memory of 460 3880 1835631eb68dbd1c381cbd529d905e9d.exe 90 PID 3880 wrote to memory of 460 3880 1835631eb68dbd1c381cbd529d905e9d.exe 90 PID 3880 wrote to memory of 460 3880 1835631eb68dbd1c381cbd529d905e9d.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1835631eb68dbd1c381cbd529d905e9d.exe"C:\Users\Admin\AppData\Local\Temp\1835631eb68dbd1c381cbd529d905e9d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Roaming\Windows Def\WinDef.exe"C:\Users\Admin\AppData\Roaming\Windows Def\WinDef.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD538ffc3163026b258ea1d186cc8660489
SHA1121b7396a9c8cbbc025c8cf42b706ad68df87779
SHA25692005562f6fa8d7918c20723a78330f5af46deeb5ace54f633a7a02ff51d717f
SHA51214e4eef3e41f7fffee8cf4f7a53c441e35a0f9fc647cee28187222a2cc1978d5cec4a6c2b7789adf7103d47b59f2d80a2139c3a1e35c77f88dcdfd805adce5cc