Resubmissions

05-03-2024 23:31

240305-3hsqtace5s 10

05-03-2024 18:08

240305-wq4dysdc2y 10

Analysis

  • max time kernel
    1792s
  • max time network
    1571s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-03-2024 18:08

General

  • Target

    StatesFenceStatutesTennessee.exe

  • Size

    327.7MB

  • MD5

    7e25fdb1932480e3e6ec31b22d08c19e

  • SHA1

    0dfca2e6c1c89b1e85fdbb9da31a93964db7b826

  • SHA256

    fbef401c6a7ad24640f6b6583aa0d0fa02aa895c47ab08e68b0e6e312d1b42a5

  • SHA512

    2bb81a8ddda7ef4bbc9508c7c80f56b5a00215674ad38e442937c42a2ecdf4e827b906b97bf63c67c36dd0a7ef78d2c6b5b6202d96516ece8b5d2dbd355f8326

  • SSDEEP

    196608:99GeDVI5DKBWZlkgJedYs6LtYdEhqTgKDf:9kYVI5DK2NNs6LtYdEhSpz

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Themida packer 7 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\StatesFenceStatutesTennessee.exe
    "C:\Users\Admin\AppData\Local\Temp\StatesFenceStatutesTennessee.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2968 -s 1076
      2⤵
        PID:2708

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\0b881921-3d0c-4e45-bfb6-1e275b7d6fb1\AgileDotNetRT64.dll

      Filesize

      1.0MB

      MD5

      af6b8b4376a40643533026473822a25a

      SHA1

      dc82783f34464a504d77a1f3a59afe143b272772

      SHA256

      bc1f54fbe344659e04378d425dda35a9835244b645509cd92463a63945fbc8bd

      SHA512

      4169acd59bbfde2209a0a61667c5bc66588cdd6f3c93ff148e10133466ce37be2acdb31b15fc4c8da7a0ceb5caf966378b5007f3cfb7a176cb9ec6ad45f537a9

    • \Users\Admin\AppData\Local\Temp\0b881921-3d0c-4e45-bfb6-1e275b7d6fb1\AgileDotNetRT64.dll

      Filesize

      1.1MB

      MD5

      4713406c75fc2ddd3a04f83ef3215bdc

      SHA1

      aa4771c74a023f57ebf0c3cda7cdfac7872b5d0f

      SHA256

      cca1114cd4949885b279747bd673854aee450d23858fff9d198527176d91b0f9

      SHA512

      866a8424f65c5d75214b2b0e65e43a632c3f02b699dfb959683b5e76367d50edf342c7cbcdcb682565f710617795a04e135c36ccc4286cbedfc46d5a870da4bd

    • memory/2968-11-0x000007FEF2180000-0x000007FEF2932000-memory.dmp

      Filesize

      7.7MB

    • memory/2968-2-0x000000002F5E0000-0x000000002F660000-memory.dmp

      Filesize

      512KB

    • memory/2968-1-0x0000000000DA0000-0x0000000001DA0000-memory.dmp

      Filesize

      16.0MB

    • memory/2968-9-0x000007FEF2180000-0x000007FEF2932000-memory.dmp

      Filesize

      7.7MB

    • memory/2968-0-0x000007FEF5D80000-0x000007FEF676C000-memory.dmp

      Filesize

      9.9MB

    • memory/2968-21-0x000007FEF46C0000-0x000007FEF47EC000-memory.dmp

      Filesize

      1.2MB

    • memory/2968-22-0x000007FEF2180000-0x000007FEF2932000-memory.dmp

      Filesize

      7.7MB

    • memory/2968-24-0x000007FEF5D80000-0x000007FEF676C000-memory.dmp

      Filesize

      9.9MB

    • memory/2968-25-0x000000002F5E0000-0x000000002F660000-memory.dmp

      Filesize

      512KB

    • memory/2968-59-0x000007FEF2180000-0x000007FEF2932000-memory.dmp

      Filesize

      7.7MB

    • memory/2968-77-0x000007FEF2180000-0x000007FEF2932000-memory.dmp

      Filesize

      7.7MB