Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2024, 03:06

General

  • Target

    ce7c3e44660f7c5a9edaf792afe365c4de79f28612c93a4ad0a3d8278c1e0a00.exe

  • Size

    15.6MB

  • MD5

    1cd6c6dc15eb17ad352302fab413f8a6

  • SHA1

    eda11aba636479b472a52b1049a42f38998cac9e

  • SHA256

    ce7c3e44660f7c5a9edaf792afe365c4de79f28612c93a4ad0a3d8278c1e0a00

  • SHA512

    2f607cbdc3e9077214dbb482fe357606724e3236f782ed83dfdd5cca7c7390561614399fe8de4aff340d959610fd0cc8b4daa0a2fb168271d8101269fd132b68

  • SSDEEP

    393216:iLVatRL3h4xNJ4ZfJ5XybaEHC/zqjgF0kE/jLKezlMC:iotRF4x/4Zx5CbPC/EJ/jLX5

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce7c3e44660f7c5a9edaf792afe365c4de79f28612c93a4ad0a3d8278c1e0a00.exe
    "C:\Users\Admin\AppData\Local\Temp\ce7c3e44660f7c5a9edaf792afe365c4de79f28612c93a4ad0a3d8278c1e0a00.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:404
  • C:\Users\Admin\AppData\Local\Edge\HaYlG9PtcB2YV23DH7ZhcfUZwC6Te0\msedge.exe
    C:\Users\Admin\AppData\Local\Edge\HaYlG9PtcB2YV23DH7ZhcfUZwC6Te0\msedge.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1636

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Edge\HaYlG9PtcB2YV23DH7ZhcfUZwC6Te0\DAT.dat

          Filesize

          504KB

          MD5

          d38617f36c54230df9a9080653c14472

          SHA1

          87a8026e8c8902a6a68cb712930b5b0675b9e552

          SHA256

          933e7a80f637d954f36bb685d5c6fe70715bb506cc74fe35949e7b48fe128f91

          SHA512

          46ae200c619691e9d302a779844b9e99e3e5e1a9b6968f0e382e61a29566088528c2b18626e5abfc775179363188ecfb5c7aa2485f07763c9972c702678d279f

        • C:\Users\Admin\AppData\Local\Edge\HaYlG9PtcB2YV23DH7ZhcfUZwC6Te0\XZWidgetImp.dll

          Filesize

          2.1MB

          MD5

          335eafe9e2bbaf5bca00024dfc60cb54

          SHA1

          627bce9a4abe1515cc2868c465b4653a67940d4a

          SHA256

          84b18396b77635abfee64efe9aa543d5e24a5e4b98727837d1681b3a017c54d9

          SHA512

          ed3e4f28c72afe9935e873a30e29eae040f758ad6c11d861e903facc5d1f29e7a37f5904d5a8c4762e54381f6fa3bb54498443aa612a540e98db84ee06b48596

        • C:\Users\Admin\AppData\Local\Edge\HaYlG9PtcB2YV23DH7ZhcfUZwC6Te0\msedge.exe

          Filesize

          981KB

          MD5

          7d9837c7a57e266a1b350ea086209f5d

          SHA1

          7c8e25f93e089f487f0710e446324568bc18a603

          SHA256

          e73b2fadfe3eb26a32f12af1066d92e0d18433d2e54f927e3b087c7f1aca7e6d

          SHA512

          df8b24e30445c0720c85efb0343a88a811bcd3d707f7a7c21158be4eff600aabd7b5a629af926ebb384991470359973d800dc97c21144c82001988abfdf0bce6

        • memory/404-1-0x0000000000400000-0x00000000014DE000-memory.dmp

          Filesize

          16.9MB

        • memory/404-6-0x0000000010000000-0x00000000103F1000-memory.dmp

          Filesize

          3.9MB

        • memory/404-5-0x0000000010000000-0x00000000103F1000-memory.dmp

          Filesize

          3.9MB

        • memory/404-7-0x0000000010000000-0x00000000103F1000-memory.dmp

          Filesize

          3.9MB

        • memory/404-8-0x0000000010000000-0x00000000103F1000-memory.dmp

          Filesize

          3.9MB

        • memory/404-16-0x0000000000400000-0x00000000014DE000-memory.dmp

          Filesize

          16.9MB

        • memory/404-0-0x0000000000400000-0x00000000014DE000-memory.dmp

          Filesize

          16.9MB

        • memory/404-2-0x0000000010000000-0x00000000103F1000-memory.dmp

          Filesize

          3.9MB

        • memory/404-23-0x0000000000400000-0x00000000014DE000-memory.dmp

          Filesize

          16.9MB

        • memory/404-24-0x0000000010000000-0x00000000103F1000-memory.dmp

          Filesize

          3.9MB

        • memory/1636-32-0x00000000048F0000-0x000000000496F000-memory.dmp

          Filesize

          508KB

        • memory/1636-40-0x0000000074330000-0x0000000074832000-memory.dmp

          Filesize

          5.0MB

        • memory/1636-27-0x0000000004820000-0x0000000004821000-memory.dmp

          Filesize

          4KB

        • memory/1636-28-0x0000000004840000-0x0000000004841000-memory.dmp

          Filesize

          4KB

        • memory/1636-29-0x0000000004830000-0x0000000004831000-memory.dmp

          Filesize

          4KB

        • memory/1636-25-0x00000000774D4000-0x00000000774D6000-memory.dmp

          Filesize

          8KB

        • memory/1636-33-0x00000000048F0000-0x000000000496F000-memory.dmp

          Filesize

          508KB

        • memory/1636-31-0x00000000048F0000-0x000000000496F000-memory.dmp

          Filesize

          508KB

        • memory/1636-21-0x0000000074330000-0x0000000074832000-memory.dmp

          Filesize

          5.0MB

        • memory/1636-34-0x00000000048F0000-0x000000000496F000-memory.dmp

          Filesize

          508KB

        • memory/1636-37-0x0000000074330000-0x0000000074832000-memory.dmp

          Filesize

          5.0MB

        • memory/1636-38-0x0000000074330000-0x0000000074832000-memory.dmp

          Filesize

          5.0MB

        • memory/1636-39-0x0000000074330000-0x0000000074832000-memory.dmp

          Filesize

          5.0MB

        • memory/1636-26-0x0000000074330000-0x0000000074832000-memory.dmp

          Filesize

          5.0MB

        • memory/1636-41-0x00000000048F0000-0x000000000496F000-memory.dmp

          Filesize

          508KB

        • memory/1636-42-0x0000000074330000-0x0000000074832000-memory.dmp

          Filesize

          5.0MB

        • memory/1636-43-0x0000000074330000-0x0000000074832000-memory.dmp

          Filesize

          5.0MB

        • memory/1636-44-0x0000000074330000-0x0000000074832000-memory.dmp

          Filesize

          5.0MB

        • memory/1636-45-0x0000000074330000-0x0000000074832000-memory.dmp

          Filesize

          5.0MB

        • memory/1636-46-0x0000000074330000-0x0000000074832000-memory.dmp

          Filesize

          5.0MB

        • memory/1636-47-0x0000000074330000-0x0000000074832000-memory.dmp

          Filesize

          5.0MB

        • memory/1636-48-0x0000000074330000-0x0000000074832000-memory.dmp

          Filesize

          5.0MB

        • memory/1636-49-0x0000000074330000-0x0000000074832000-memory.dmp

          Filesize

          5.0MB

        • memory/1636-50-0x0000000074330000-0x0000000074832000-memory.dmp

          Filesize

          5.0MB

        • memory/1636-51-0x0000000074330000-0x0000000074832000-memory.dmp

          Filesize

          5.0MB

        • memory/1636-52-0x0000000074330000-0x0000000074832000-memory.dmp

          Filesize

          5.0MB