Analysis
-
max time kernel
1199s -
max time network
1159s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/02/2024, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
Updater.exe
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
Updater.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Updater.exe
Resource
win11-20240221-en
General
-
Target
Updater.exe
-
Size
1023KB
-
MD5
67e741557eaa3124261105bff38bc62a
-
SHA1
a2a0543d6b61ac0a9380cb6d64f78b16951912e0
-
SHA256
b2e6a04435ab8d41a5a259072b6c29dec30caa05ed1ec2a8bae2b2670573981e
-
SHA512
ce95336095b5a6f3faef4944794fd8cc7fda5b5f9db31c3211532a7c03b3c94106978bcbb5de4a5fdbd06024ec90215b1b7fd6fa816309907073e7da6a55522f
-
SSDEEP
12288:oVDH4arSas0SRUXA5S9ZgvlZW9AxBK8ctBGOKLDcEHDqYocAXrexgPlBo8Ker5+m:24arTs0S2Q5SgitBj+RacAXUUBLeJ4/
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cleanmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 31 2092 rundll32.exe 37 2092 rundll32.exe 38 2092 rundll32.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cleanmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cleanmgr.exe -
Loads dropped DLL 2 IoCs
pid Process 1648 cleanmgr.exe 2092 rundll32.exe -
Registers COM server for autorun 1 TTPs 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\WOW6432Node\CLSID\{8369AB20-56C9-11D0-94E8-00AA0059CE02}\InprocServer32 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\WOW6432Node\CLSID\{8369AB20-56C9-11D0-94E8-00AA0059CE02}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CleanUp.dll" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\Wow6432Node\CLSID\{8369AB20-56C9-11D0-94E8-00AA0059CE02}\InprocServer32 cleanmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\WOW6432Node\CLSID\{8369AB20-56C9-11D0-94E8-00AA0059CE02}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CleanUp.dll" cleanmgr.exe Key created \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\Wow6432Node\CLSID\{8369AB20-56C9-11D0-94E8-00AA0059CE02}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\WOW6432Node\CLSID\{8369AB20-56C9-11D0-94E8-00AA0059CE02}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CleanUp.dll" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\Wow6432Node\CLSID\{8369AB20-56C9-11D0-94E8-00AA0059CE02}\InprocServer32 explorer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000\Software\Microsoft\Windows\CurrentVersion\Run\Disk Cleanup = "C:\\Windows\\SysWow64\\cleanmgr.exe /verylowdisk" explorer.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1648 cleanmgr.exe 2092 rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3184 set thread context of 1208 3184 Updater.exe 85 -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\WOW6432Node\CLSID\{8369AB20-56C9-11D0-94E8-00AA0059CE02}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CleanUp.dll" cleanmgr.exe Key created \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\Wow6432Node\CLSID\{8369AB20-56C9-11D0-94E8-00AA0059CE02}\InprocServer32 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\WOW6432Node\CLSID\{8369AB20-56C9-11D0-94E8-00AA0059CE02}\InprocServer32 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\WOW6432Node\CLSID\{8369AB20-56C9-11D0-94E8-00AA0059CE02}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CleanUp.dll" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\WOW6432Node\CLSID explorer.exe Key created \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\WOW6432Node\CLSID\{8369AB20-56C9-11D0-94E8-00AA0059CE02} explorer.exe Key created \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\Wow6432Node\CLSID\{8369AB20-56C9-11D0-94E8-00AA0059CE02}\InprocServer32 cleanmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\WOW6432Node\CLSID\{8369AB20-56C9-11D0-94E8-00AA0059CE02}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CleanUp.dll" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\Wow6432Node\CLSID\{8369AB20-56C9-11D0-94E8-00AA0059CE02}\InprocServer32 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000_Classes\Wow6432Node explorer.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 3184 Updater.exe 3184 Updater.exe 1208 cmd.exe 4960 explorer.exe 4960 explorer.exe 1648 cleanmgr.exe 1648 cleanmgr.exe 1648 cleanmgr.exe 1648 cleanmgr.exe 2092 rundll32.exe 2092 rundll32.exe 2092 rundll32.exe 2092 rundll32.exe 2092 rundll32.exe 2092 rundll32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3184 Updater.exe 1208 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4960 explorer.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3184 wrote to memory of 1208 3184 Updater.exe 85 PID 3184 wrote to memory of 1208 3184 Updater.exe 85 PID 3184 wrote to memory of 1208 3184 Updater.exe 85 PID 3184 wrote to memory of 1208 3184 Updater.exe 85 PID 1208 wrote to memory of 4960 1208 cmd.exe 87 PID 1208 wrote to memory of 4960 1208 cmd.exe 87 PID 1208 wrote to memory of 4960 1208 cmd.exe 87 PID 1208 wrote to memory of 4960 1208 cmd.exe 87 PID 1208 wrote to memory of 4960 1208 cmd.exe 87 PID 4960 wrote to memory of 1648 4960 explorer.exe 90 PID 4960 wrote to memory of 1648 4960 explorer.exe 90 PID 4960 wrote to memory of 1648 4960 explorer.exe 90 PID 4960 wrote to memory of 1708 4960 explorer.exe 91 PID 4960 wrote to memory of 1708 4960 explorer.exe 91 PID 4960 wrote to memory of 1708 4960 explorer.exe 91 PID 1648 wrote to memory of 2092 1648 cleanmgr.exe 93 PID 1648 wrote to memory of 2092 1648 cleanmgr.exe 93 PID 1648 wrote to memory of 2092 1648 cleanmgr.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\Updater.exe"C:\Users\Admin\AppData\Local\Temp\Updater.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Registers COM server for autorun
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\cleanmgr.exe"C:\Windows\SysWOW64\cleanmgr.exe" /verylowdisk4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Registers COM server for autorun
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\CleanUp.dll,DiskCleaner5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Registers COM server for autorun
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2092
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\explorer.exe > nul4⤵PID:1708
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.8MB
MD5985811bb4bd004d01527b1359036a8b8
SHA1675a8135a37b3fd4838b719a98ac8aee9820672f
SHA25606c49d820a32ea3e1d02e7b77100178a9c1d897b68e6d6c03703d129bdf0aa8d
SHA5125b9f906facf31a12710f9ba74392d8ed745890d4ddeb71c9448204cdd5cf15e05c06fef0a14962c263625b48e5a09c2a32a195314def4cef089f25e7632401c6
-
Filesize
3.8MB
MD50e94ab4c25860bc49f096464ec3afbf4
SHA10270b4f33984f2a70e8667bcb98b0cf3b74fdd79
SHA25600248e85582157b9af1f5a3b05fc90134d3f433347b0dc31aa3d185d6595cb7b
SHA512aa28d97839f9953c2649ef552ba549cc94abb86cf39a62af81be755494e87eda65244a9ce220d04ef555360637b24592162f9c9f2e718b1daf1fd5a53c7f4a95
-
Filesize
3.9MB
MD5e2715eea093952fe0f86212acc67c54a
SHA1f859f8db122bfb7ac742639d4cf44167f70e44ce
SHA25626f213e18d20aba53ef25ef1064434474c1bf563a1671217698177177603950f
SHA51234a5dfb4c726e208159983040c0ae91e859a215080624bac1e0f9357cfe3cc6d5f5203b774fe3e881622e80c890e8ef54880109ccd348245a535e30fe870cca2