Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 11:29
Static task
static1
Behavioral task
behavioral1
Sample
6542fe83ee30583be3b685a10c1febe2.exe
Resource
win7-20231215-en
General
-
Target
6542fe83ee30583be3b685a10c1febe2.exe
-
Size
4.7MB
-
MD5
6542fe83ee30583be3b685a10c1febe2
-
SHA1
c8813c2a3a1e84e0cbbea98bd724d9a332e63200
-
SHA256
2ab7cf367f4c8953c507d4ca5b17873921c5671a8103087430919e947295bc7b
-
SHA512
9df0846596f45705a1e8bee33e1dca2b1287f7d77a96dc895808b607ce9c388c1e40262325d26468a030405f04e9c73a639497948373278cf335cd5a22b7dbfe
-
SSDEEP
98304:ObahIEd2q543OIf/CEN2hTBrHJWGs2NyqeoNE/7SRYYQ:OGx2qG3N//ETVHJack+O
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6542fe83ee30583be3b685a10c1febe2.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6542fe83ee30583be3b685a10c1febe2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6542fe83ee30583be3b685a10c1febe2.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Wine 6542fe83ee30583be3b685a10c1febe2.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1624 icacls.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1316 6542fe83ee30583be3b685a10c1febe2.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb javaw.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1316 6542fe83ee30583be3b685a10c1febe2.exe 1316 6542fe83ee30583be3b685a10c1febe2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2232 1316 6542fe83ee30583be3b685a10c1febe2.exe 87 PID 1316 wrote to memory of 2232 1316 6542fe83ee30583be3b685a10c1febe2.exe 87 PID 2232 wrote to memory of 1624 2232 javaw.exe 89 PID 2232 wrote to memory of 1624 2232 javaw.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\6542fe83ee30583be3b685a10c1febe2.exe"C:\Users\Admin\AppData\Local\Temp\6542fe83ee30583be3b685a10c1febe2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath "C:\Users\Admin\AppData\Local\Temp\6542fe83ee30583be3b685a10c1febe2.exe" org.develnext.jphp.ext.javafx.FXLauncher2⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:1624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5ad9f08e1a954f75e3903e3399674fe5a
SHA1a209e3ae145c372c5abe3f3fa104c0c0292f95ac
SHA25683cf5e2455383047cb0d07e2113d742560aa9253709c724eeb40d44c54624742
SHA5121e89e69bacc37472bd583092714d90936b7525fe3762a871fe27057d0886ee43a0a1712f838d30f038607c72d1f5fbfeb17c291599eb408bdee5b589c8bca821