Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 13:00
Static task
static1
Behavioral task
behavioral1
Sample
9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe
Resource
win7-20240215-en
General
-
Target
9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe
-
Size
2.5MB
-
MD5
65792e4d02f910d20dcf74487cb9fab1
-
SHA1
942337f3ea28f553b47dc05726bb062befe09fef
-
SHA256
9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f
-
SHA512
14f2bc63e7c59a9988426f71905066596d15def0f1238b6acac1aa45367ca896bfcfd24e984fffcf8ba4cd36130da6c67530a876992b7e80c1591df4cf25fd9e
-
SSDEEP
49152:k1pt5y4+ehRpj3bQxZI9SoesOCpnROKcQtngNbawIVbf8Amz2FNaZU6NVX:k9M7ERF3bcZipROTMngNVKr02v2t
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exedescription ioc process File opened (read-only) \??\q: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\y: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\z: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\b: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\h: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\n: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\p: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\s: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\i: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\l: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\o: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\u: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\w: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\a: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\e: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\r: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\m: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\t: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\v: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\x: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\g: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\j: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe File opened (read-only) \??\k: 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/1148-7-0x0000000000400000-0x00000000008EE000-memory.dmp autoit_exe behavioral2/memory/1148-57-0x0000000000400000-0x00000000008EE000-memory.dmp autoit_exe behavioral2/memory/1148-122-0x0000000000400000-0x00000000008EE000-memory.dmp autoit_exe behavioral2/memory/1148-124-0x0000000000400000-0x00000000008EE000-memory.dmp autoit_exe behavioral2/memory/1148-126-0x0000000000400000-0x00000000008EE000-memory.dmp autoit_exe behavioral2/memory/1148-128-0x0000000000400000-0x00000000008EE000-memory.dmp autoit_exe behavioral2/memory/1148-131-0x0000000000400000-0x00000000008EE000-memory.dmp autoit_exe behavioral2/memory/1148-133-0x0000000000400000-0x00000000008EE000-memory.dmp autoit_exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exedescription pid process target process PID 1148 wrote to memory of 3900 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 3900 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 3900 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 3512 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 3512 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 3512 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 3300 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 3300 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 3300 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 3168 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 3168 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 3168 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4044 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4044 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4044 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 3236 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 3236 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 3236 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4404 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4404 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4404 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4560 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4560 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4560 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4548 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4548 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4548 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 836 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 836 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 836 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 2164 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 2164 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 2164 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4084 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4084 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4084 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 768 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 768 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 768 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4728 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4728 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4728 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4112 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4112 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4112 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 1356 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 1356 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 1356 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 1984 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 1984 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 1984 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 2504 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 2504 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 2504 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 3676 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 3676 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 3676 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 3492 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 3492 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 3492 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4768 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4768 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 4768 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe PID 1148 wrote to memory of 2852 1148 9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe"C:\Users\Admin\AppData\Local\Temp\9fbeb629ea0dc72ac8db680855984d51b28c1195e48abff2e68b0228f49d5b0f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A2⤵PID:3900
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A2⤵PID:3512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A2⤵PID:3300
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.docx" /S /B /A2⤵PID:3168
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.docm" /S /B /A2⤵PID:4044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A2⤵PID:3236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A2⤵PID:4404
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A2⤵PID:4560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xls" /S /B /A2⤵PID:4548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xlsx" /S /B /A2⤵PID:836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xlsm" /S /B /A2⤵PID:2164
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A2⤵PID:4084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A2⤵PID:768
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A2⤵PID:4728
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A2⤵PID:4112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A2⤵PID:1356
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pptx" /S /B /A2⤵PID:1984
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A2⤵PID:2504
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A2⤵PID:3676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A2⤵PID:3492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A2⤵PID:4768
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A2⤵PID:2852
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A2⤵PID:1224
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A2⤵PID:3532
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A2⤵PID:4556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.txt" /S /B /A2⤵PID:4964
-