Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-02-2024 09:40

General

  • Target

    7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe

  • Size

    7.1MB

  • MD5

    e019295a44882db3321c692f7d818b8b

  • SHA1

    2c5f371ac5db8062b876571d20398c60b0b0f584

  • SHA256

    7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86

  • SHA512

    002fb6d60a3c8874c7e257cdb174928cd908223bc3fb553cd9fd6506bfc91b6cb45fdc2909fb069fad9b4a75fefbde3addeacc444bc76f25e47fe560925be4e6

  • SSDEEP

    98304:hwdhBkGMb188jaz+2RYKNpYzp5jsvYjJ+tSfby2N/lZU5V1FXwOoopC+2UOZ:f88Oz8hro8+tkt/lZaloopC+

Malware Config

Signatures

  • Detected Ploutus loader 2 IoCs
  • Ploutus

    Ploutus is an ATM malware written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe
    "C:\Users\Admin\AppData\Local\Temp\7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:672
    • C:\Users\Admin\AppData\Local\Temp\KOD0ndy6Jy.exe
      "C:\Users\Admin\AppData\Local\Temp\KOD0ndy6Jy.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      PID:4816
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\xdCiyWybC0.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:4016

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

3
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\KOD0ndy6Jy.exe
    Filesize

    3.3MB

    MD5

    124ad6606cc9f765211cd2b0ec693d1d

    SHA1

    faf93dc414593c604af7579a1c8b3663b596da45

    SHA256

    811d3ed71642a6b2f49995b79e1aca84025b6ec8cbac5ee99608d354314685a9

    SHA512

    b9e8083174491dd79f3ab7280153827f8860515139f43b1c4dee282e3295973fb8715f1a2a3acaff0fd7c4b489d3eac5a363350728eecc2f00cbc136be46a4eb

  • C:\Users\Admin\AppData\Local\Temp\KOD0ndy6Jy.exe
    Filesize

    4.8MB

    MD5

    80b4d6f1da00532cbbc22bfc1411ecc6

    SHA1

    022f9f1659645448d852218d046923a7b79a25b4

    SHA256

    a3dd1fee47ec9a9a72283e47b095e67eeb1ec0d7e9df82bc1004bb788b331020

    SHA512

    7bdc622e9806700928ecf3c64ac9e3bc56f0c2a443222f9646fb81db8cbf33b351ad832866501f17f9ad799348396a703ae8c9cb2a2ec7584305efc76c22ac82

  • C:\Users\Admin\AppData\Local\Temp\KOD0ndy6Jy.exe
    Filesize

    4.6MB

    MD5

    7d7a64635cc47531a32beb931f7fbb4f

    SHA1

    065b22c226c15382619f90821af08184822b27ca

    SHA256

    6d4a520e1b21242b89d2ecc328fbe82e783f5f439094760067adf252a960a04c

    SHA512

    7457b5243cedfb3172e45ae1a76d3037c50e0673702e8ed2dd561e49b72c3e68afe051bae199bb2a96e47d33b4fddfd0859d066df7e49708acf08aaa3c8fe496

  • C:\Users\Admin\AppData\Local\Temp\xdCiyWybC0.txt
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • memory/672-22-0x0000000000400000-0x0000000000B2B000-memory.dmp
    Filesize

    7.2MB

  • memory/4816-15-0x00000000776D0000-0x00000000777C0000-memory.dmp
    Filesize

    960KB

  • memory/4816-16-0x00000000776D0000-0x00000000777C0000-memory.dmp
    Filesize

    960KB

  • memory/4816-17-0x0000000073030000-0x00000000737E0000-memory.dmp
    Filesize

    7.7MB

  • memory/4816-18-0x0000000000970000-0x0000000000E48000-memory.dmp
    Filesize

    4.8MB

  • memory/4816-19-0x0000000000970000-0x0000000000E48000-memory.dmp
    Filesize

    4.8MB

  • memory/4816-20-0x0000000007470000-0x0000000007A14000-memory.dmp
    Filesize

    5.6MB

  • memory/4816-21-0x0000000004C80000-0x0000000004C8A000-memory.dmp
    Filesize

    40KB

  • memory/4816-11-0x0000000000970000-0x0000000000E48000-memory.dmp
    Filesize

    4.8MB

  • memory/4816-26-0x0000000000970000-0x0000000000E48000-memory.dmp
    Filesize

    4.8MB

  • memory/4816-27-0x00000000776D0000-0x00000000777C0000-memory.dmp
    Filesize

    960KB

  • memory/4816-28-0x00000000776D0000-0x00000000777C0000-memory.dmp
    Filesize

    960KB

  • memory/4816-29-0x0000000073030000-0x00000000737E0000-memory.dmp
    Filesize

    7.7MB