Analysis
-
max time kernel
138s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 03:06
General
-
Target
Fragment.exe
-
Size
3.6MB
-
MD5
96aeac278f4c16b5545d8264b9d9103e
-
SHA1
6d9e1db1fac6aa99eb2ff60be514f7c045b64d67
-
SHA256
b11afbe3b821ff6e6b6ea3c74058b7c2b10cbf5dfe1da52befcad7b85c032a15
-
SHA512
8da68eff7cf8565fb55f95da129bdc0ad3673de3a1707988d702be955279362577092848fa93f90f0b4eb2fba8680f431d6c6f43578163279ffa3d91c6dcaa66
-
SSDEEP
98304:mJK2vINDgbGwDD0kSWh4KeapPPCufYKA0tC:mJKrVtwca49ySz
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Fragment.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Fragment.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Fragment.exe -
resource yara_rule behavioral1/memory/3356-0-0x00007FF7A4630000-0x00007FF7A4DE0000-memory.dmp themida behavioral1/memory/3356-1-0x00007FF7A4630000-0x00007FF7A4DE0000-memory.dmp themida behavioral1/memory/3356-2-0x00007FF7A4630000-0x00007FF7A4DE0000-memory.dmp themida behavioral1/memory/3356-3-0x00007FF7A4630000-0x00007FF7A4DE0000-memory.dmp themida behavioral1/memory/3356-4-0x00007FF7A4630000-0x00007FF7A4DE0000-memory.dmp themida behavioral1/memory/3356-5-0x00007FF7A4630000-0x00007FF7A4DE0000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Fragment.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3356 Fragment.exe 3356 Fragment.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3356 wrote to memory of 1484 3356 Fragment.exe 94 PID 3356 wrote to memory of 1484 3356 Fragment.exe 94 PID 1484 wrote to memory of 1336 1484 cmd.exe 99 PID 1484 wrote to memory of 1336 1484 cmd.exe 99 PID 1484 wrote to memory of 3556 1484 cmd.exe 97 PID 1484 wrote to memory of 3556 1484 cmd.exe 97 PID 1484 wrote to memory of 4100 1484 cmd.exe 96 PID 1484 wrote to memory of 4100 1484 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fragment.exe"C:\Users\Admin\AppData\Local\Temp\Fragment.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Fragment.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:4100
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:3556
-
-
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Fragment.exe" MD53⤵PID:1336
-
-