Analysis

  • max time kernel
    148s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12-02-2024 12:28

General

  • Target

    97273d65603839cf542745359470e8ba.exe

  • Size

    4.4MB

  • MD5

    97273d65603839cf542745359470e8ba

  • SHA1

    d96f1ec8be081e2226f4ca4384f5fcb9f4613f86

  • SHA256

    51a9f6c8be826bf9b121848ee255138e73032e3a89f49c3a4d0ae35576e8f645

  • SHA512

    1d2bc504969ebeaf9ff4c3dbc562d102976f11caf1f2abcceee23c3078178d241adea0e097c0521abf3872a486b8c0ad5aeeae273703a30f80387918093326b0

  • SSDEEP

    98304:JeIt5UwFAoIQ5unMssx3MwCGN/g9Z+KRvubPBdK9+:JeECwF9qMF8Y/g9AjbPrM+

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Registers new Print Monitor 2 TTPs 5 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 14 IoCs
  • Modifies registry class 13 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97273d65603839cf542745359470e8ba.exe
    "C:\Users\Admin\AppData\Local\Temp\97273d65603839cf542745359470e8ba.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Users\Admin\AppData\Local\Temp\Ñà×Ó¿ìµÝ´òÓ¡.exe
      C:\Users\Admin\AppData\Local\Temp\Ñà×Ó¿ìµÝ´òÓ¡.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Enumerates connected drives
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c net stop Spooler
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:672
        • C:\Windows\SysWOW64\net.exe
          net stop Spooler
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2860
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop Spooler
            5⤵
              PID:1780
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c net start Spooler
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2924
          • C:\Windows\SysWOW64\net.exe
            net start Spooler
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1304
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start Spooler
              5⤵
                PID:988
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding
        1⤵
          PID:1100
        • C:\Windows\System32\spoolsv.exe
          C:\Windows\System32\spoolsv.exe
          1⤵
          • Registers new Print Monitor
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:1484

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\yzkddy\set.ini

          Filesize

          104B

          MD5

          eaec66468df2311967fe93bc594a4bc6

          SHA1

          01fc12c5a1311d6e27f7313723d6b5bb9458de68

          SHA256

          7d42893ca9d4ea66f5a1a0207d3babf9553902706d62aca492fea43641153b61

          SHA512

          41f55aaf719f22d1d31b246fea27928bac994234b9195fead14abadb959d47f26d7b0b6f8ee3d771ca5d36465287792585d1672771d815d71ba223a272887a31

        • C:\Users\Admin\AppData\Local\Temp\yzkddy\surl.ini

          Filesize

          15KB

          MD5

          7955e2593b426a4ca9b44d10a8d9378e

          SHA1

          4651a0d6e2d826074327bd189e3edbec600d9395

          SHA256

          1b3e4b567680e065dcc1fedb2a80503332263a0df8cd723aba460ee3246a9bb3

          SHA512

          470f2da2cb1e342d521f74cc77c55d21843b78a4b099a38c8bd7fc3a6cf6eaaaf0dd4b6a279262080bc02dbbcae381e06e601c70a1a61ea9e23c7e3612ddc75b

        • C:\Users\Admin\AppData\Local\Temp\Ñà×Ó¿ìµÝ´òÓ¡.exe

          Filesize

          2.8MB

          MD5

          5225cc48720980008cd791a4bb08fa75

          SHA1

          88cc793b5fc36d313063bb96bd291634820938f7

          SHA256

          db07216e51ef49704c9d57fd18db2cdb16d9e5a0ce21f3a5fa2260499e4d101b

          SHA512

          fd537a973c9d100b56d4d85a2130906738ec86dda1236777ab48165ddf8e019ea65598fa6963090cd6ddfbf79adade73fdb18b07963ecaf425a2c76375487377

        • C:\Users\Admin\AppData\Local\Temp\Ñà×Ó¿ìµÝ´òÓ¡.exe

          Filesize

          4.4MB

          MD5

          97273d65603839cf542745359470e8ba

          SHA1

          d96f1ec8be081e2226f4ca4384f5fcb9f4613f86

          SHA256

          51a9f6c8be826bf9b121848ee255138e73032e3a89f49c3a4d0ae35576e8f645

          SHA512

          1d2bc504969ebeaf9ff4c3dbc562d102976f11caf1f2abcceee23c3078178d241adea0e097c0521abf3872a486b8c0ad5aeeae273703a30f80387918093326b0

        • C:\Windows\ozd

          Filesize

          29B

          MD5

          e5dd6eda8fb744cb786490b10fe19551

          SHA1

          011eb525d86573255c0b6853172f4999f99bfe8a

          SHA256

          2759ea8baa1346689681af8d8857e86a73cbca38513a884043b6f7110cbc553f

          SHA512

          50ea43330b9ba3c28d2948230d029bd2ea35b0185fc5ec2a84873a932fa25f80817e428ef289abf9f4423bbbd4d6fda933699f2694968079f7d84a163676e280

        • \Users\Admin\AppData\Local\Temp\Ñà×Ó¿ìµÝ´òÓ¡.exe

          Filesize

          1.5MB

          MD5

          16f5e0c82c09ab5ebbef52d7c3661ad9

          SHA1

          2615a0302d9423fd75fcd68bdd6bf80b4c95bec7

          SHA256

          78d12fa91d9af7453d1d7e26ac64a71e7c46b1042aaaeccfc6fabd406bec615f

          SHA512

          e0ff67dff82daf25680caf31e6e35342ca3807377728597bf59b7bc58926db5e61cd93ead195ae17d7380fc9689efb15641ebf85322f242f22cdd70fc51fbbf7

        • memory/624-4-0x0000000004B70000-0x0000000004B71000-memory.dmp

          Filesize

          4KB

        • memory/624-17-0x0000000000400000-0x0000000000E23000-memory.dmp

          Filesize

          10.1MB

        • memory/624-14-0x0000000004B30000-0x0000000004B31000-memory.dmp

          Filesize

          4KB

        • memory/624-13-0x0000000004AB0000-0x0000000004AB1000-memory.dmp

          Filesize

          4KB

        • memory/624-12-0x0000000004A30000-0x0000000004A31000-memory.dmp

          Filesize

          4KB

        • memory/624-11-0x0000000004BF0000-0x0000000004BF1000-memory.dmp

          Filesize

          4KB

        • memory/624-10-0x0000000004BC0000-0x0000000004BC1000-memory.dmp

          Filesize

          4KB

        • memory/624-9-0x0000000004AC0000-0x0000000004AC1000-memory.dmp

          Filesize

          4KB

        • memory/624-8-0x0000000004A60000-0x0000000004A61000-memory.dmp

          Filesize

          4KB

        • memory/624-7-0x0000000004A40000-0x0000000004A42000-memory.dmp

          Filesize

          8KB

        • memory/624-6-0x0000000004A10000-0x0000000004A11000-memory.dmp

          Filesize

          4KB

        • memory/624-5-0x0000000004B40000-0x0000000004B42000-memory.dmp

          Filesize

          8KB

        • memory/624-16-0x0000000004B90000-0x0000000004B91000-memory.dmp

          Filesize

          4KB

        • memory/624-3-0x00000000048A0000-0x00000000048A1000-memory.dmp

          Filesize

          4KB

        • memory/624-2-0x0000000004AE0000-0x0000000004AE1000-memory.dmp

          Filesize

          4KB

        • memory/624-15-0x0000000004880000-0x0000000004881000-memory.dmp

          Filesize

          4KB

        • memory/624-24-0x0000000004A20000-0x0000000004A21000-memory.dmp

          Filesize

          4KB

        • memory/624-23-0x0000000004C30000-0x0000000004C32000-memory.dmp

          Filesize

          8KB

        • memory/624-22-0x0000000004EE0000-0x0000000004EE2000-memory.dmp

          Filesize

          8KB

        • memory/624-21-0x0000000004BB0000-0x0000000004BB1000-memory.dmp

          Filesize

          4KB

        • memory/624-20-0x0000000004B50000-0x0000000004B51000-memory.dmp

          Filesize

          4KB

        • memory/624-19-0x0000000004AD0000-0x0000000004AD1000-memory.dmp

          Filesize

          4KB

        • memory/624-18-0x0000000004B80000-0x0000000004B81000-memory.dmp

          Filesize

          4KB

        • memory/624-25-0x00000000048B0000-0x00000000048B1000-memory.dmp

          Filesize

          4KB

        • memory/624-27-0x0000000004C00000-0x0000000004C01000-memory.dmp

          Filesize

          4KB

        • memory/624-28-0x0000000004D00000-0x0000000004D02000-memory.dmp

          Filesize

          8KB

        • memory/624-29-0x0000000004BA0000-0x0000000004BA1000-memory.dmp

          Filesize

          4KB

        • memory/624-31-0x0000000004A00000-0x0000000004A01000-memory.dmp

          Filesize

          4KB

        • memory/624-36-0x0000000000400000-0x0000000000E23000-memory.dmp

          Filesize

          10.1MB

        • memory/624-65-0x0000000000400000-0x0000000000E23000-memory.dmp

          Filesize

          10.1MB

        • memory/624-1-0x0000000077120000-0x0000000077122000-memory.dmp

          Filesize

          8KB

        • memory/624-0-0x0000000000400000-0x0000000000E23000-memory.dmp

          Filesize

          10.1MB

        • memory/2788-52-0x0000000004BA0000-0x0000000004BA1000-memory.dmp

          Filesize

          4KB

        • memory/2788-150-0x0000000004B60000-0x0000000004B61000-memory.dmp

          Filesize

          4KB

        • memory/2788-42-0x0000000004910000-0x0000000004911000-memory.dmp

          Filesize

          4KB

        • memory/2788-53-0x0000000004BB0000-0x0000000004BB1000-memory.dmp

          Filesize

          4KB

        • memory/2788-40-0x0000000004B90000-0x0000000004B91000-memory.dmp

          Filesize

          4KB

        • memory/2788-51-0x0000000004B30000-0x0000000004B31000-memory.dmp

          Filesize

          4KB

        • memory/2788-50-0x0000000004970000-0x0000000004971000-memory.dmp

          Filesize

          4KB

        • memory/2788-49-0x0000000004920000-0x0000000004921000-memory.dmp

          Filesize

          4KB

        • memory/2788-48-0x0000000004C00000-0x0000000004C01000-memory.dmp

          Filesize

          4KB

        • memory/2788-47-0x0000000004950000-0x0000000004951000-memory.dmp

          Filesize

          4KB

        • memory/2788-46-0x0000000004BE0000-0x0000000004BE1000-memory.dmp

          Filesize

          4KB

        • memory/2788-45-0x0000000004990000-0x0000000004991000-memory.dmp

          Filesize

          4KB

        • memory/2788-44-0x0000000004960000-0x0000000004961000-memory.dmp

          Filesize

          4KB

        • memory/2788-43-0x0000000004940000-0x0000000004942000-memory.dmp

          Filesize

          8KB

        • memory/2788-55-0x0000000000400000-0x0000000000E23000-memory.dmp

          Filesize

          10.1MB

        • memory/2788-56-0x0000000004B80000-0x0000000004B81000-memory.dmp

          Filesize

          4KB

        • memory/2788-58-0x0000000004900000-0x0000000004901000-memory.dmp

          Filesize

          4KB

        • memory/2788-57-0x0000000004BD0000-0x0000000004BD1000-memory.dmp

          Filesize

          4KB

        • memory/2788-59-0x0000000004F10000-0x0000000004F12000-memory.dmp

          Filesize

          8KB

        • memory/2788-39-0x00000000048A0000-0x00000000048A1000-memory.dmp

          Filesize

          4KB

        • memory/2788-64-0x0000000004BF0000-0x0000000004BF1000-memory.dmp

          Filesize

          4KB

        • memory/2788-68-0x00000000049A0000-0x00000000049A1000-memory.dmp

          Filesize

          4KB

        • memory/2788-149-0x0000000004890000-0x0000000004891000-memory.dmp

          Filesize

          4KB

        • memory/2788-41-0x0000000004B50000-0x0000000004B52000-memory.dmp

          Filesize

          8KB

        • memory/2788-151-0x00000000048F0000-0x00000000048F1000-memory.dmp

          Filesize

          4KB

        • memory/2788-67-0x0000000004980000-0x0000000004981000-memory.dmp

          Filesize

          4KB

        • memory/2788-63-0x0000000004BC0000-0x0000000004BC1000-memory.dmp

          Filesize

          4KB

        • memory/2788-62-0x00000000049B0000-0x00000000049B1000-memory.dmp

          Filesize

          4KB

        • memory/2788-61-0x0000000004C10000-0x0000000004C11000-memory.dmp

          Filesize

          4KB

        • memory/2788-60-0x0000000004C60000-0x0000000004C62000-memory.dmp

          Filesize

          8KB

        • memory/2788-152-0x0000000004B20000-0x0000000004B21000-memory.dmp

          Filesize

          4KB

        • memory/2788-156-0x0000000004D30000-0x0000000004D32000-memory.dmp

          Filesize

          8KB

        • memory/2788-161-0x0000000000400000-0x0000000000E23000-memory.dmp

          Filesize

          10.1MB

        • memory/2788-167-0x0000000000400000-0x0000000000E23000-memory.dmp

          Filesize

          10.1MB

        • memory/2788-168-0x0000000000400000-0x0000000000E23000-memory.dmp

          Filesize

          10.1MB

        • memory/2788-170-0x0000000000400000-0x0000000000E23000-memory.dmp

          Filesize

          10.1MB

        • memory/2788-171-0x0000000000400000-0x0000000000E23000-memory.dmp

          Filesize

          10.1MB

        • memory/2788-172-0x0000000000400000-0x0000000000E23000-memory.dmp

          Filesize

          10.1MB

        • memory/2788-173-0x0000000000400000-0x0000000000E23000-memory.dmp

          Filesize

          10.1MB

        • memory/2788-174-0x0000000000400000-0x0000000000E23000-memory.dmp

          Filesize

          10.1MB

        • memory/2788-37-0x0000000000400000-0x0000000000E23000-memory.dmp

          Filesize

          10.1MB

        • memory/2788-182-0x0000000000400000-0x0000000000E23000-memory.dmp

          Filesize

          10.1MB

        • memory/2788-183-0x0000000000400000-0x0000000000E23000-memory.dmp

          Filesize

          10.1MB

        • memory/2788-191-0x0000000000400000-0x0000000000E23000-memory.dmp

          Filesize

          10.1MB

        • memory/2788-192-0x0000000000400000-0x0000000000E23000-memory.dmp

          Filesize

          10.1MB

        • memory/2788-193-0x0000000000400000-0x0000000000E23000-memory.dmp

          Filesize

          10.1MB

        • memory/2788-194-0x0000000000400000-0x0000000000E23000-memory.dmp

          Filesize

          10.1MB