Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/01/2024, 17:05

General

  • Target

    3e88b34577127200e234c26d748568c3.exe

  • Size

    1.7MB

  • MD5

    3e88b34577127200e234c26d748568c3

  • SHA1

    19ca1d37820fc27dfbca59add089453296fec9d3

  • SHA256

    7c55010cd8982b11ac159339b794c20d86c26bcc50af3347be48bc8e16716892

  • SHA512

    95ab438ef566186296f12837187ceba43f0e7f41839950e335973945c5a051eb841353baef9675fc714e42f9aff156b94b6c3e34944ce6f6adb74a9c70dbb94e

  • SSDEEP

    24576:IXyF6pw84hMVHlxAVM6o/6mnCsCPQkLUfWK4mk0EO7VI6P+Rm447wUaQzpogpywp:I+nhMVHlxWMWPQiUxq0dLSOycyQDr4M

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e88b34577127200e234c26d748568c3.exe
    "C:\Users\Admin\AppData\Local\Temp\3e88b34577127200e234c26d748568c3.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:428
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c: && cd\ && taskkill /f /im ÊØ»¤´óʦ.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1380
  • C:\Windows\SysWOW64\taskkill.exe
    taskkill /f /im ÊØ»¤´óʦ.exe
    1⤵
    • Kills process with taskkill
    • Suspicious use of AdjustPrivilegeToken
    PID:2304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/428-0-0x0000000000400000-0x0000000000884000-memory.dmp

    Filesize

    4.5MB

  • memory/428-1-0x00000000771B4000-0x00000000771B6000-memory.dmp

    Filesize

    8KB

  • memory/428-11-0x0000000004AF0000-0x0000000004AF1000-memory.dmp

    Filesize

    4KB

  • memory/428-10-0x0000000004B00000-0x0000000004B01000-memory.dmp

    Filesize

    4KB

  • memory/428-12-0x0000000000400000-0x0000000000884000-memory.dmp

    Filesize

    4.5MB

  • memory/428-13-0x0000000004B80000-0x0000000004B81000-memory.dmp

    Filesize

    4KB

  • memory/428-24-0x0000000004CD0000-0x0000000004CD2000-memory.dmp

    Filesize

    8KB

  • memory/428-27-0x0000000004B90000-0x0000000004B91000-memory.dmp

    Filesize

    4KB

  • memory/428-26-0x0000000004C60000-0x0000000004C61000-memory.dmp

    Filesize

    4KB

  • memory/428-25-0x0000000004BD0000-0x0000000004BD1000-memory.dmp

    Filesize

    4KB

  • memory/428-23-0x0000000004C70000-0x0000000004C71000-memory.dmp

    Filesize

    4KB

  • memory/428-22-0x0000000004BA0000-0x0000000004BA1000-memory.dmp

    Filesize

    4KB

  • memory/428-21-0x0000000004C40000-0x0000000004C41000-memory.dmp

    Filesize

    4KB

  • memory/428-19-0x0000000004B40000-0x0000000004B41000-memory.dmp

    Filesize

    4KB

  • memory/428-20-0x0000000004C50000-0x0000000004C51000-memory.dmp

    Filesize

    4KB

  • memory/428-18-0x0000000004C10000-0x0000000004C11000-memory.dmp

    Filesize

    4KB

  • memory/428-17-0x0000000004C00000-0x0000000004C01000-memory.dmp

    Filesize

    4KB

  • memory/428-16-0x0000000004DB0000-0x0000000004DB2000-memory.dmp

    Filesize

    8KB

  • memory/428-15-0x0000000004B60000-0x0000000004B61000-memory.dmp

    Filesize

    4KB

  • memory/428-14-0x0000000004BE0000-0x0000000004BE1000-memory.dmp

    Filesize

    4KB

  • memory/428-9-0x0000000004AC0000-0x0000000004AC1000-memory.dmp

    Filesize

    4KB

  • memory/428-8-0x0000000004AD0000-0x0000000004AD2000-memory.dmp

    Filesize

    8KB

  • memory/428-7-0x0000000004B20000-0x0000000004B21000-memory.dmp

    Filesize

    4KB

  • memory/428-6-0x0000000004AE0000-0x0000000004AE1000-memory.dmp

    Filesize

    4KB

  • memory/428-5-0x0000000004B30000-0x0000000004B31000-memory.dmp

    Filesize

    4KB

  • memory/428-4-0x0000000004B10000-0x0000000004B11000-memory.dmp

    Filesize

    4KB

  • memory/428-3-0x0000000004AB0000-0x0000000004AB1000-memory.dmp

    Filesize

    4KB

  • memory/428-2-0x0000000004AA0000-0x0000000004AA1000-memory.dmp

    Filesize

    4KB

  • memory/428-28-0x0000000000400000-0x0000000000884000-memory.dmp

    Filesize

    4.5MB

  • memory/428-29-0x0000000000400000-0x0000000000884000-memory.dmp

    Filesize

    4.5MB

  • memory/428-30-0x0000000000400000-0x0000000000884000-memory.dmp

    Filesize

    4.5MB

  • memory/428-31-0x0000000000400000-0x0000000000884000-memory.dmp

    Filesize

    4.5MB

  • memory/428-32-0x0000000000400000-0x0000000000884000-memory.dmp

    Filesize

    4.5MB