Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
b577ec3998ec131c95adbfb1ed7e2cb7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b577ec3998ec131c95adbfb1ed7e2cb7.exe
Resource
win10v2004-20240226-en
General
-
Target
b577ec3998ec131c95adbfb1ed7e2cb7.exe
-
Size
1.1MB
-
MD5
b577ec3998ec131c95adbfb1ed7e2cb7
-
SHA1
48d0aa8be425df1487b8ec4ff24b89471926fa56
-
SHA256
465911da6755870f32c91beacfcf886e816a079f5e639921e89e03a0ba391ff4
-
SHA512
dc724a3e54c736212aa615de89f1195a9139b6c81f7183e65ab9df47562b631d37bcdf865adb855874c2852649eb008615f2b44c789cc9cb53eb6ac1c9b34faa
-
SSDEEP
12288:r76X3YGXutAOH3kCI+wDA4jD5+r3Ftn32WR1OEk/6qfSd1c525RdhZckB2oGE5zJ:6VCnrPSE46qqdiCIkhDO6/d3gLK64J
Malware Config
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/3008-3-0x00000000002E0000-0x00000000002F2000-memory.dmp CustAttr -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions b577ec3998ec131c95adbfb1ed7e2cb7.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools b577ec3998ec131c95adbfb1ed7e2cb7.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b577ec3998ec131c95adbfb1ed7e2cb7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b577ec3998ec131c95adbfb1ed7e2cb7.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b577ec3998ec131c95adbfb1ed7e2cb7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 b577ec3998ec131c95adbfb1ed7e2cb7.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2440 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 31 PID 3008 wrote to memory of 2440 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 31 PID 3008 wrote to memory of 2440 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 31 PID 3008 wrote to memory of 2440 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 31 PID 3008 wrote to memory of 2456 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 32 PID 3008 wrote to memory of 2456 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 32 PID 3008 wrote to memory of 2456 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 32 PID 3008 wrote to memory of 2456 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 32 PID 3008 wrote to memory of 2496 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 33 PID 3008 wrote to memory of 2496 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 33 PID 3008 wrote to memory of 2496 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 33 PID 3008 wrote to memory of 2496 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 33 PID 3008 wrote to memory of 2544 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 34 PID 3008 wrote to memory of 2544 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 34 PID 3008 wrote to memory of 2544 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 34 PID 3008 wrote to memory of 2544 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 34 PID 3008 wrote to memory of 2476 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 35 PID 3008 wrote to memory of 2476 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 35 PID 3008 wrote to memory of 2476 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 35 PID 3008 wrote to memory of 2476 3008 b577ec3998ec131c95adbfb1ed7e2cb7.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\b577ec3998ec131c95adbfb1ed7e2cb7.exe"C:\Users\Admin\AppData\Local\Temp\b577ec3998ec131c95adbfb1ed7e2cb7.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\b577ec3998ec131c95adbfb1ed7e2cb7.exe"C:\Users\Admin\AppData\Local\Temp\b577ec3998ec131c95adbfb1ed7e2cb7.exe"2⤵PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\b577ec3998ec131c95adbfb1ed7e2cb7.exe"C:\Users\Admin\AppData\Local\Temp\b577ec3998ec131c95adbfb1ed7e2cb7.exe"2⤵PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\b577ec3998ec131c95adbfb1ed7e2cb7.exe"C:\Users\Admin\AppData\Local\Temp\b577ec3998ec131c95adbfb1ed7e2cb7.exe"2⤵PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\b577ec3998ec131c95adbfb1ed7e2cb7.exe"C:\Users\Admin\AppData\Local\Temp\b577ec3998ec131c95adbfb1ed7e2cb7.exe"2⤵PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\b577ec3998ec131c95adbfb1ed7e2cb7.exe"C:\Users\Admin\AppData\Local\Temp\b577ec3998ec131c95adbfb1ed7e2cb7.exe"2⤵PID:2476
-