Analysis

  • max time kernel
    16s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-04-2024 14:22

Errors

Reason
Machine shutdown

General

  • Target

    TUP32980638916Y/ctfmon1.exe

  • Size

    870KB

  • MD5

    82d2590bfa019845cbdd670427d31674

  • SHA1

    5b96ae15e9d3e0db2ebd4d94c930a39bf1829afe

  • SHA256

    7d361e62e333b2ed467505025fd04c75b63c6aca9b15dad6f76adc8bd1deadbd

  • SHA512

    8d071e78cf1db6d8391b567e64a04e42fd0b83bab3b2d3af729899b41a92cb7068576914a63fbbd3af3601d74a49e9620bab0a6788c13d4dad6319ce837380ee

  • SSDEEP

    24576:FAHnh+eWsN3skA4RV1Hom2KXMmHahM065:0h+ZkldoPK8YahY

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TUP32980638916Y\ctfmon1.exe
    "C:\Users\Admin\AppData\Local\Temp\TUP32980638916Y\ctfmon1.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Windows\SysWOW64\dllhost.exe
      "C:\Windows\System32\dllhost.exe"
      2⤵
      • Checks BIOS information in registry
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Suspicious behavior: EnumeratesProcesses
      PID:2576
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c shutdown -s -t 2 -f
        3⤵
          PID:3484
          • C:\Windows\SysWOW64\shutdown.exe
            shutdown -s -t 2 -f
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3564
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c shutdown -s -t 2 -f
          3⤵
            PID:3492
            • C:\Windows\SysWOW64\shutdown.exe
              shutdown -s -t 2 -f
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:3572
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c shutdown -s -t 1 -f
            3⤵
              PID:3512
              • C:\Windows\SysWOW64\shutdown.exe
                shutdown -s -t 1 -f
                4⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:3616
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x0
          1⤵
            PID:3668
          • C:\Windows\system32\LogonUI.exe
            "LogonUI.exe" /flags:0x1
            1⤵
              PID:3860

            Network

            MITRE ATT&CK Matrix ATT&CK v13

            Discovery

            Query Registry

            1
            T1012

            System Information Discovery

            2
            T1082

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2148-0-0x00000000001A0000-0x00000000001A1000-memory.dmp
              Filesize

              4KB

            • memory/2148-1-0x00000000001C0000-0x00000000001C1000-memory.dmp
              Filesize

              4KB

            • memory/2148-2-0x00000000001B0000-0x00000000001B1000-memory.dmp
              Filesize

              4KB

            • memory/2148-3-0x00000000001E0000-0x00000000001E1000-memory.dmp
              Filesize

              4KB

            • memory/2148-4-0x00000000001F0000-0x000000000022A000-memory.dmp
              Filesize

              232KB

            • memory/2576-14-0x0000000000070000-0x0000000000071000-memory.dmp
              Filesize

              4KB

            • memory/2576-21-0x00000000000E0000-0x00000000000E1000-memory.dmp
              Filesize

              4KB

            • memory/2576-31-0x00000000001D0000-0x00000000001D1000-memory.dmp
              Filesize

              4KB

            • memory/2576-4438-0x0000000010410000-0x000000001064C000-memory.dmp
              Filesize

              2.2MB

            • memory/2576-4456-0x0000000010410000-0x000000001064C000-memory.dmp
              Filesize

              2.2MB

            • memory/3668-4455-0x00000000029C0000-0x00000000029C1000-memory.dmp
              Filesize

              4KB

            • memory/3860-4457-0x00000000027E0000-0x00000000027E1000-memory.dmp
              Filesize

              4KB