Analysis

  • max time kernel
    143s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29-02-2024 09:40

General

  • Target

    7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe

  • Size

    7.1MB

  • MD5

    e019295a44882db3321c692f7d818b8b

  • SHA1

    2c5f371ac5db8062b876571d20398c60b0b0f584

  • SHA256

    7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86

  • SHA512

    002fb6d60a3c8874c7e257cdb174928cd908223bc3fb553cd9fd6506bfc91b6cb45fdc2909fb069fad9b4a75fefbde3addeacc444bc76f25e47fe560925be4e6

  • SSDEEP

    98304:hwdhBkGMb188jaz+2RYKNpYzp5jsvYjJ+tSfby2N/lZU5V1FXwOoopC+2UOZ:f88Oz8hro8+tkt/lZaloopC+

Malware Config

Signatures

  • Detected Ploutus loader 2 IoCs
  • Ploutus

    Ploutus is an ATM malware written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe
    "C:\Users\Admin\AppData\Local\Temp\7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Users\Admin\AppData\Local\Temp\GruqyKY0Fr.exe
      "C:\Users\Admin\AppData\Local\Temp\GruqyKY0Fr.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      PID:2884
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\EXvr2NPzlX.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:2556

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\EXvr2NPzlX.txt
    Filesize

    51B

    MD5

    1322ceb566e06ea83fd534fa84b5bb9e

    SHA1

    e87d32b26005d5183b2acd5d9fecd308f95fe3dc

    SHA256

    53b9bf5b5a207cdfe0e468e0853e8eec1ba7d1e98d4efb4c19cd8b9ce70bacb8

    SHA512

    919e8782a0d1ea233061def068e00a21ae4c5f8c4d01fc9b32c828af797804c8cee09707847a6781b0616d3156d55e188cee6427200c4e627a2ae2bf8564851e

  • C:\Users\Admin\AppData\Local\Temp\GruqyKY0Fr.exe
    Filesize

    4.8MB

    MD5

    80b4d6f1da00532cbbc22bfc1411ecc6

    SHA1

    022f9f1659645448d852218d046923a7b79a25b4

    SHA256

    a3dd1fee47ec9a9a72283e47b095e67eeb1ec0d7e9df82bc1004bb788b331020

    SHA512

    7bdc622e9806700928ecf3c64ac9e3bc56f0c2a443222f9646fb81db8cbf33b351ad832866501f17f9ad799348396a703ae8c9cb2a2ec7584305efc76c22ac82

  • \Users\Admin\AppData\Local\Temp\GruqyKY0Fr.exe
    Filesize

    4.0MB

    MD5

    9b9647d41ac969b26862a99b36514795

    SHA1

    ee51297c6556b22edca429cbeec7e4fac7c3ccd5

    SHA256

    f04b1fd404c310eca4628c307eda07240ccdd915bbcf6ee0b578e397cbe502a9

    SHA512

    66a83792ba0385b72c8f29c96d249a6b5cc32aa5c41a72b5b03c6a3a9e872332f87afd4b1a720fd684cc5dfd0ddfe73271a91690b11d6d397ac7a27cfec87cd4

  • memory/1764-7-0x0000000002FB0000-0x0000000003488000-memory.dmp
    Filesize

    4.8MB

  • memory/1764-18-0x0000000000400000-0x0000000000B2B000-memory.dmp
    Filesize

    7.2MB

  • memory/2884-13-0x00000000001E0000-0x00000000006B8000-memory.dmp
    Filesize

    4.8MB

  • memory/2884-11-0x0000000074FA0000-0x0000000074FA9000-memory.dmp
    Filesize

    36KB

  • memory/2884-12-0x0000000074870000-0x00000000748BA000-memory.dmp
    Filesize

    296KB

  • memory/2884-10-0x0000000075790000-0x00000000758A0000-memory.dmp
    Filesize

    1.1MB

  • memory/2884-14-0x00000000001E0000-0x00000000006B8000-memory.dmp
    Filesize

    4.8MB

  • memory/2884-15-0x0000000074100000-0x00000000747EE000-memory.dmp
    Filesize

    6.9MB

  • memory/2884-16-0x0000000075CE0000-0x0000000075DAC000-memory.dmp
    Filesize

    816KB

  • memory/2884-17-0x0000000075570000-0x0000000075660000-memory.dmp
    Filesize

    960KB

  • memory/2884-8-0x00000000001E0000-0x00000000006B8000-memory.dmp
    Filesize

    4.8MB

  • memory/2884-21-0x0000000075790000-0x00000000758A0000-memory.dmp
    Filesize

    1.1MB

  • memory/2884-23-0x0000000074870000-0x00000000748BA000-memory.dmp
    Filesize

    296KB

  • memory/2884-24-0x0000000074100000-0x00000000747EE000-memory.dmp
    Filesize

    6.9MB

  • memory/2884-25-0x0000000075570000-0x0000000075660000-memory.dmp
    Filesize

    960KB