Analysis
-
max time kernel
27s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 21:05
Static task
static1
Behavioral task
behavioral1
Sample
login.exe
Resource
win7-20240221-en
General
-
Target
login.exe
-
Size
429KB
-
MD5
b88444cf2c03ce4efe2a1608a379ee53
-
SHA1
68d9285ee72288656c258cf9db9c564226a48ddb
-
SHA256
d70e292a21ebc5ca1675ca585bcae52a51aad4bcee9bbbaf44b0a2cc635b64c7
-
SHA512
7c9e116a417f2a15d2ca3f70b61697c9e34b6131b12221032cde9d64c41993f6f8cfa34196ed99122aa34d59159955d6362827f0d4eee1688bce465539e8d633
-
SSDEEP
12288:Zt5NpMGK6Ia5Jr4IQAvq3eSKXvVZhuwxHvh:Zt5NGGzIo3QSqOS+VZhT
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ loader.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion loader.exe -
Executes dropped EXE 1 IoCs
pid Process 4204 loader.exe -
resource yara_rule behavioral2/files/0x0009000000023235-2.dat themida behavioral2/memory/4204-4-0x00007FF6F7EB0000-0x00007FF6F894F000-memory.dmp themida behavioral2/memory/4204-6-0x00007FF6F7EB0000-0x00007FF6F894F000-memory.dmp themida behavioral2/memory/4204-7-0x00007FF6F7EB0000-0x00007FF6F894F000-memory.dmp themida behavioral2/memory/4204-8-0x00007FF6F7EB0000-0x00007FF6F894F000-memory.dmp themida behavioral2/memory/4204-9-0x00007FF6F7EB0000-0x00007FF6F894F000-memory.dmp themida behavioral2/memory/4204-10-0x00007FF6F7EB0000-0x00007FF6F894F000-memory.dmp themida behavioral2/memory/4204-11-0x00007FF6F7EB0000-0x00007FF6F894F000-memory.dmp themida behavioral2/memory/4204-12-0x00007FF6F7EB0000-0x00007FF6F894F000-memory.dmp themida behavioral2/memory/4204-13-0x00007FF6F7EB0000-0x00007FF6F894F000-memory.dmp themida behavioral2/memory/4204-14-0x00007FF6F7EB0000-0x00007FF6F894F000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA loader.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4204 loader.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4204 loader.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4204 loader.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1216 wrote to memory of 3596 1216 login.exe 92 PID 1216 wrote to memory of 3596 1216 login.exe 92 PID 3596 wrote to memory of 4204 3596 cmd.exe 93 PID 3596 wrote to memory of 4204 3596 cmd.exe 93 PID 4204 wrote to memory of 2292 4204 loader.exe 100 PID 4204 wrote to memory of 2292 4204 loader.exe 100 PID 2292 wrote to memory of 4704 2292 cmd.exe 102 PID 2292 wrote to memory of 4704 2292 cmd.exe 102 PID 2292 wrote to memory of 1184 2292 cmd.exe 103 PID 2292 wrote to memory of 1184 2292 cmd.exe 103 PID 2292 wrote to memory of 2120 2292 cmd.exe 104 PID 2292 wrote to memory of 2120 2292 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\login.exe"C:\Users\Admin\AppData\Local\Temp\login.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Roaming\celex-v2\loader.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Roaming\celex-v2\loader.exeC:\Users\Admin\AppData\Roaming\celex-v2\loader.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Roaming\celex-v2\loader.exe" MD5 | find /i /v "md5" | find /i /v "certutil"4⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Roaming\celex-v2\loader.exe" MD55⤵PID:4704
-
-
C:\Windows\system32\find.exefind /i /v "md5"5⤵PID:1184
-
-
C:\Windows\system32\find.exefind /i /v "certutil"5⤵PID:2120
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD59ecdc9ed1bea6c226f92d740d43400b9
SHA1b5b5066cd4284733d8c3f3d7de3ca6653091ae10
SHA25660c57f14c2e0e0df0bda16646b21dddceaee0159dafbbb8daba310d4e1b5be6c
SHA51230bc705a2438288e3647d5adfc6119d751823970972b9c6b39a60384a2b7ac261986026b8d1c0b0ca7ee3d7e95363c97b873fdc5fad4096c903cb4e15bf57e43