Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-02-2024 16:09
Static task
static1
Behavioral task
behavioral1
Sample
a994e6555f2de587dd8f5a011e372077.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a994e6555f2de587dd8f5a011e372077.exe
Resource
win10v2004-20240226-en
General
-
Target
a994e6555f2de587dd8f5a011e372077.exe
-
Size
1.3MB
-
MD5
a994e6555f2de587dd8f5a011e372077
-
SHA1
b6ed70695b034f6959ea522d0e760e68434e4602
-
SHA256
b75fb381e3bfc708fb2ae57fe9ddcba282b08bbe5790449af56dde30d7c5b371
-
SHA512
0267a110df617d94949224cb0fba57ecd7f834fc068b21437a6b9593b933f9f59efbfd37251a24ff0afa67d758f47a27daea1b91ba2da8844fefa85570456777
-
SSDEEP
24576:z2XEn3Bn3mvCJHeABSuAcVzVdRMHzkyKD8+NdBsd0NBX7WrZE:Kql3zleAb3VdoUNJBrM2
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a994e6555f2de587dd8f5a011e372077.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a994e6555f2de587dd8f5a011e372077.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBIOSDate a994e6555f2de587dd8f5a011e372077.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Wine a994e6555f2de587dd8f5a011e372077.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: a994e6555f2de587dd8f5a011e372077.exe File opened (read-only) \??\I: a994e6555f2de587dd8f5a011e372077.exe File opened (read-only) \??\M: a994e6555f2de587dd8f5a011e372077.exe File opened (read-only) \??\R: a994e6555f2de587dd8f5a011e372077.exe File opened (read-only) \??\S: a994e6555f2de587dd8f5a011e372077.exe File opened (read-only) \??\Y: a994e6555f2de587dd8f5a011e372077.exe File opened (read-only) \??\J: a994e6555f2de587dd8f5a011e372077.exe File opened (read-only) \??\T: a994e6555f2de587dd8f5a011e372077.exe File opened (read-only) \??\U: a994e6555f2de587dd8f5a011e372077.exe File opened (read-only) \??\V: a994e6555f2de587dd8f5a011e372077.exe File opened (read-only) \??\Z: a994e6555f2de587dd8f5a011e372077.exe File opened (read-only) \??\H: a994e6555f2de587dd8f5a011e372077.exe File opened (read-only) \??\K: a994e6555f2de587dd8f5a011e372077.exe File opened (read-only) \??\L: a994e6555f2de587dd8f5a011e372077.exe File opened (read-only) \??\O: a994e6555f2de587dd8f5a011e372077.exe File opened (read-only) \??\Q: a994e6555f2de587dd8f5a011e372077.exe File opened (read-only) \??\X: a994e6555f2de587dd8f5a011e372077.exe File opened (read-only) \??\G: a994e6555f2de587dd8f5a011e372077.exe File opened (read-only) \??\N: a994e6555f2de587dd8f5a011e372077.exe File opened (read-only) \??\P: a994e6555f2de587dd8f5a011e372077.exe File opened (read-only) \??\W: a994e6555f2de587dd8f5a011e372077.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 a994e6555f2de587dd8f5a011e372077.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1712 a994e6555f2de587dd8f5a011e372077.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBIOSDate a994e6555f2de587dd8f5a011e372077.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1712 a994e6555f2de587dd8f5a011e372077.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1712 a994e6555f2de587dd8f5a011e372077.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1712 a994e6555f2de587dd8f5a011e372077.exe 1712 a994e6555f2de587dd8f5a011e372077.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2680 1712 a994e6555f2de587dd8f5a011e372077.exe 28 PID 1712 wrote to memory of 2680 1712 a994e6555f2de587dd8f5a011e372077.exe 28 PID 1712 wrote to memory of 2680 1712 a994e6555f2de587dd8f5a011e372077.exe 28 PID 1712 wrote to memory of 2680 1712 a994e6555f2de587dd8f5a011e372077.exe 28 PID 2680 wrote to memory of 2428 2680 cmd.exe 30 PID 2680 wrote to memory of 2428 2680 cmd.exe 30 PID 2680 wrote to memory of 2428 2680 cmd.exe 30 PID 2680 wrote to memory of 2428 2680 cmd.exe 30 PID 2428 wrote to memory of 2472 2428 net.exe 31 PID 2428 wrote to memory of 2472 2428 net.exe 31 PID 2428 wrote to memory of 2472 2428 net.exe 31 PID 2428 wrote to memory of 2472 2428 net.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a994e6555f2de587dd8f5a011e372077.exe"C:\Users\Admin\AppData\Local\Temp\a994e6555f2de587dd8f5a011e372077.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop Spooler2⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\net.exenet stop Spooler3⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Spooler4⤵PID:2472
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding1⤵PID:2112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5cf4211730cb747f3b8ad4fd3e832aeff
SHA1a9ced132a3171a77db95398dc56fceff9d0ac77a
SHA256e4096d6b7340d2c0767b68205426ee18291f18f0747e43e5c8f0369594ab796a
SHA5127a8447c8101ffab6f00a880a624a7c359578451c12870415a5ba4f6857c4bb6a598dd4d7b756994bc4a6f3db4735a4b58fa884375eeed6f6e440cad33f4a7743