Analysis
-
max time kernel
129s -
max time network
135s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-04-2024 23:52
Static task
static1
General
-
Target
CojcsWGNGl.exe
-
Size
6.0MB
-
MD5
bb3cef2577d61f6db132ea9127687653
-
SHA1
23744c6489204c1c12a7db9f11736826df8612fc
-
SHA256
82c05e788b690d480d56cf4f093a7739d668934acdba574191a6ecc88e843bb5
-
SHA512
700cdf03182d0e86ac7daacda067e7603d0e7fe0d3bff112efb4eb8c968eac2af9033bf4b03e6d05ec92f955a2bc626ab43b52d1125c6ada11beb229a65470a2
-
SSDEEP
49152:xr3uXF+Kb8t3A+Gha2ImSJLuHHuFJajTpYEfSozlqBDMj74oNDdTxfZP:xr3uXFq0haJtin9
Malware Config
Extracted
bumblebee
proc_123
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest CojcsWGNGl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse CojcsWGNGl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService CojcsWGNGl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF CojcsWGNGl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo CojcsWGNGl.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ CojcsWGNGl.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ CojcsWGNGl.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ CojcsWGNGl.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions CojcsWGNGl.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools CojcsWGNGl.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CojcsWGNGl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CojcsWGNGl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate CojcsWGNGl.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000\SOFTWARE\Wine CojcsWGNGl.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer CojcsWGNGl.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName CojcsWGNGl.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN CojcsWGNGl.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CojcsWGNGl.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CojcsWGNGl.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CojcsWGNGl.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe 4812 CojcsWGNGl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CojcsWGNGl.exe"C:\Users\Admin\AppData\Local\Temp\CojcsWGNGl.exe"1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks system information in the registry
- Checks for VirtualBox DLLs, possible anti-VM trick
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:4812