Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2024, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
3e88b34577127200e234c26d748568c3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e88b34577127200e234c26d748568c3.exe
Resource
win10v2004-20231222-en
General
-
Target
3e88b34577127200e234c26d748568c3.exe
-
Size
1.7MB
-
MD5
3e88b34577127200e234c26d748568c3
-
SHA1
19ca1d37820fc27dfbca59add089453296fec9d3
-
SHA256
7c55010cd8982b11ac159339b794c20d86c26bcc50af3347be48bc8e16716892
-
SHA512
95ab438ef566186296f12837187ceba43f0e7f41839950e335973945c5a051eb841353baef9675fc714e42f9aff156b94b6c3e34944ce6f6adb74a9c70dbb94e
-
SSDEEP
24576:IXyF6pw84hMVHlxAVM6o/6mnCsCPQkLUfWK4mk0EO7VI6P+Rm447wUaQzpogpywp:I+nhMVHlxWMWPQiUxq0dLSOycyQDr4M
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3e88b34577127200e234c26d748568c3.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3e88b34577127200e234c26d748568c3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3e88b34577127200e234c26d748568c3.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Wine 3e88b34577127200e234c26d748568c3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 428 3e88b34577127200e234c26d748568c3.exe -
Kills process with taskkill 1 IoCs
pid Process 2304 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 428 3e88b34577127200e234c26d748568c3.exe 428 3e88b34577127200e234c26d748568c3.exe 428 3e88b34577127200e234c26d748568c3.exe 428 3e88b34577127200e234c26d748568c3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2304 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 428 3e88b34577127200e234c26d748568c3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 428 3e88b34577127200e234c26d748568c3.exe 428 3e88b34577127200e234c26d748568c3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 428 wrote to memory of 1380 428 3e88b34577127200e234c26d748568c3.exe 32 PID 428 wrote to memory of 1380 428 3e88b34577127200e234c26d748568c3.exe 32 PID 428 wrote to memory of 1380 428 3e88b34577127200e234c26d748568c3.exe 32 PID 1380 wrote to memory of 2304 1380 cmd.exe 29 PID 1380 wrote to memory of 2304 1380 cmd.exe 29 PID 1380 wrote to memory of 2304 1380 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e88b34577127200e234c26d748568c3.exe"C:\Users\Admin\AppData\Local\Temp\3e88b34577127200e234c26d748568c3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\SysWOW64\cmd.execmd /c c: && cd\ && taskkill /f /im ÊØ»¤´óʦ.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1380
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ÊØ»¤´óʦ.exe1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2304