Analysis

  • max time kernel
    147s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-01-2024 11:29

General

  • Target

    6542fe83ee30583be3b685a10c1febe2.exe

  • Size

    4.7MB

  • MD5

    6542fe83ee30583be3b685a10c1febe2

  • SHA1

    c8813c2a3a1e84e0cbbea98bd724d9a332e63200

  • SHA256

    2ab7cf367f4c8953c507d4ca5b17873921c5671a8103087430919e947295bc7b

  • SHA512

    9df0846596f45705a1e8bee33e1dca2b1287f7d77a96dc895808b607ce9c388c1e40262325d26468a030405f04e9c73a639497948373278cf335cd5a22b7dbfe

  • SSDEEP

    98304:ObahIEd2q543OIf/CEN2hTBrHJWGs2NyqeoNE/7SRYYQ:OGx2qG3N//ETVHJack+O

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6542fe83ee30583be3b685a10c1febe2.exe
    "C:\Users\Admin\AppData\Local\Temp\6542fe83ee30583be3b685a10c1febe2.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Program Files\Java\jre-1.8\bin\javaw.exe
      "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath "C:\Users\Admin\AppData\Local\Temp\6542fe83ee30583be3b685a10c1febe2.exe" org.develnext.jphp.ext.javafx.FXLauncher
      2⤵
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2232
      • C:\Windows\system32\icacls.exe
        C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
        3⤵
        • Modifies file permissions
        PID:1624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    ad9f08e1a954f75e3903e3399674fe5a

    SHA1

    a209e3ae145c372c5abe3f3fa104c0c0292f95ac

    SHA256

    83cf5e2455383047cb0d07e2113d742560aa9253709c724eeb40d44c54624742

    SHA512

    1e89e69bacc37472bd583092714d90936b7525fe3762a871fe27057d0886ee43a0a1712f838d30f038607c72d1f5fbfeb17c291599eb408bdee5b589c8bca821

  • memory/1316-0-0x0000000000400000-0x0000000000774000-memory.dmp

    Filesize

    3.5MB

  • memory/1316-1-0x0000000077AA4000-0x0000000077AA6000-memory.dmp

    Filesize

    8KB

  • memory/1316-3-0x0000000000400000-0x0000000000774000-memory.dmp

    Filesize

    3.5MB

  • memory/1316-2-0x0000000000400000-0x0000000000774000-memory.dmp

    Filesize

    3.5MB

  • memory/1316-4-0x00000000028C0000-0x00000000028C2000-memory.dmp

    Filesize

    8KB

  • memory/2232-9-0x000002581D050000-0x000002581E050000-memory.dmp

    Filesize

    16.0MB

  • memory/2232-17-0x000002581B620000-0x000002581B621000-memory.dmp

    Filesize

    4KB

  • memory/2232-22-0x000002581D050000-0x000002581E050000-memory.dmp

    Filesize

    16.0MB

  • memory/2232-23-0x000002581D2D0000-0x000002581D2E0000-memory.dmp

    Filesize

    64KB

  • memory/2232-24-0x000002581D050000-0x000002581E050000-memory.dmp

    Filesize

    16.0MB