Analysis

  • max time kernel
    141s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-02-2024 16:09

General

  • Target

    a994e6555f2de587dd8f5a011e372077.exe

  • Size

    1.3MB

  • MD5

    a994e6555f2de587dd8f5a011e372077

  • SHA1

    b6ed70695b034f6959ea522d0e760e68434e4602

  • SHA256

    b75fb381e3bfc708fb2ae57fe9ddcba282b08bbe5790449af56dde30d7c5b371

  • SHA512

    0267a110df617d94949224cb0fba57ecd7f834fc068b21437a6b9593b933f9f59efbfd37251a24ff0afa67d758f47a27daea1b91ba2da8844fefa85570456777

  • SSDEEP

    24576:z2XEn3Bn3mvCJHeABSuAcVzVdRMHzkyKD8+NdBsd0NBX7WrZE:Kql3zleAb3VdoUNJBrM2

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a994e6555f2de587dd8f5a011e372077.exe
    "C:\Users\Admin\AppData\Local\Temp\a994e6555f2de587dd8f5a011e372077.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Enumerates connected drives
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c net stop Spooler
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Windows\SysWOW64\net.exe
        net stop Spooler
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2428
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop Spooler
          4⤵
            PID:2472
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding
      1⤵
        PID:2112

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

        Filesize

        3KB

        MD5

        cf4211730cb747f3b8ad4fd3e832aeff

        SHA1

        a9ced132a3171a77db95398dc56fceff9d0ac77a

        SHA256

        e4096d6b7340d2c0767b68205426ee18291f18f0747e43e5c8f0369594ab796a

        SHA512

        7a8447c8101ffab6f00a880a624a7c359578451c12870415a5ba4f6857c4bb6a598dd4d7b756994bc4a6f3db4735a4b58fa884375eeed6f6e440cad33f4a7743

      • memory/1712-20-0x0000000004290000-0x0000000004291000-memory.dmp

        Filesize

        4KB

      • memory/1712-15-0x00000000042B0000-0x00000000042B1000-memory.dmp

        Filesize

        4KB

      • memory/1712-4-0x00000000041E0000-0x00000000041E1000-memory.dmp

        Filesize

        4KB

      • memory/1712-14-0x0000000004270000-0x0000000004271000-memory.dmp

        Filesize

        4KB

      • memory/1712-16-0x0000000000850000-0x0000000000851000-memory.dmp

        Filesize

        4KB

      • memory/1712-17-0x00000000042A0000-0x00000000042A1000-memory.dmp

        Filesize

        4KB

      • memory/1712-26-0x0000000004280000-0x0000000004281000-memory.dmp

        Filesize

        4KB

      • memory/1712-13-0x00000000042D0000-0x00000000042D1000-memory.dmp

        Filesize

        4KB

      • memory/1712-12-0x0000000004310000-0x0000000004311000-memory.dmp

        Filesize

        4KB

      • memory/1712-11-0x0000000004260000-0x0000000004261000-memory.dmp

        Filesize

        4KB

      • memory/1712-10-0x0000000004330000-0x0000000004331000-memory.dmp

        Filesize

        4KB

      • memory/1712-27-0x0000000007410000-0x0000000007411000-memory.dmp

        Filesize

        4KB

      • memory/1712-9-0x00000000042C0000-0x00000000042C1000-memory.dmp

        Filesize

        4KB

      • memory/1712-8-0x0000000004560000-0x0000000004562000-memory.dmp

        Filesize

        8KB

      • memory/1712-7-0x00000000043A0000-0x00000000043A1000-memory.dmp

        Filesize

        4KB

      • memory/1712-6-0x00000000041F0000-0x00000000041F1000-memory.dmp

        Filesize

        4KB

      • memory/1712-3-0x0000000004240000-0x0000000004241000-memory.dmp

        Filesize

        4KB

      • memory/1712-2-0x0000000000400000-0x00000000006F2000-memory.dmp

        Filesize

        2.9MB

      • memory/1712-24-0x00000000043B0000-0x00000000043B1000-memory.dmp

        Filesize

        4KB

      • memory/1712-23-0x0000000004380000-0x0000000004381000-memory.dmp

        Filesize

        4KB

      • memory/1712-19-0x0000000004390000-0x0000000004391000-memory.dmp

        Filesize

        4KB

      • memory/1712-22-0x0000000004350000-0x0000000004351000-memory.dmp

        Filesize

        4KB

      • memory/1712-21-0x0000000004370000-0x0000000004371000-memory.dmp

        Filesize

        4KB

      • memory/1712-0-0x0000000000400000-0x00000000006F2000-memory.dmp

        Filesize

        2.9MB

      • memory/1712-25-0x0000000004360000-0x0000000004361000-memory.dmp

        Filesize

        4KB

      • memory/1712-5-0x0000000004200000-0x0000000004202000-memory.dmp

        Filesize

        8KB

      • memory/1712-18-0x0000000004340000-0x0000000004341000-memory.dmp

        Filesize

        4KB

      • memory/1712-28-0x0000000004230000-0x0000000004231000-memory.dmp

        Filesize

        4KB

      • memory/1712-29-0x00000000042E0000-0x00000000042E1000-memory.dmp

        Filesize

        4KB

      • memory/1712-30-0x0000000004300000-0x0000000004301000-memory.dmp

        Filesize

        4KB

      • memory/1712-31-0x00000000042F0000-0x00000000042F1000-memory.dmp

        Filesize

        4KB

      • memory/1712-32-0x0000000004460000-0x0000000004462000-memory.dmp

        Filesize

        8KB

      • memory/1712-33-0x0000000000400000-0x00000000006F2000-memory.dmp

        Filesize

        2.9MB

      • memory/1712-34-0x0000000000400000-0x00000000006F2000-memory.dmp

        Filesize

        2.9MB

      • memory/1712-35-0x0000000000850000-0x0000000000851000-memory.dmp

        Filesize

        4KB

      • memory/1712-36-0x0000000000400000-0x00000000006F2000-memory.dmp

        Filesize

        2.9MB

      • memory/1712-1-0x0000000077660000-0x0000000077662000-memory.dmp

        Filesize

        8KB

      • memory/1712-54-0x0000000000400000-0x00000000006F2000-memory.dmp

        Filesize

        2.9MB

      • memory/1712-55-0x0000000000400000-0x00000000006F2000-memory.dmp

        Filesize

        2.9MB

      • memory/1712-56-0x0000000000400000-0x00000000006F2000-memory.dmp

        Filesize

        2.9MB

      • memory/1712-57-0x0000000000400000-0x00000000006F2000-memory.dmp

        Filesize

        2.9MB

      • memory/1712-58-0x0000000000400000-0x00000000006F2000-memory.dmp

        Filesize

        2.9MB

      • memory/1712-59-0x0000000000400000-0x00000000006F2000-memory.dmp

        Filesize

        2.9MB

      • memory/1712-60-0x0000000000400000-0x00000000006F2000-memory.dmp

        Filesize

        2.9MB

      • memory/1712-61-0x0000000000400000-0x00000000006F2000-memory.dmp

        Filesize

        2.9MB

      • memory/1712-62-0x0000000000400000-0x00000000006F2000-memory.dmp

        Filesize

        2.9MB

      • memory/1712-63-0x0000000000400000-0x00000000006F2000-memory.dmp

        Filesize

        2.9MB

      • memory/1712-64-0x0000000000400000-0x00000000006F2000-memory.dmp

        Filesize

        2.9MB

      • memory/1712-65-0x0000000000400000-0x00000000006F2000-memory.dmp

        Filesize

        2.9MB