Analysis
-
max time kernel
15s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 20:26
Static task
static1
Behavioral task
behavioral1
Sample
AtXtpwIJyQWWufbN.exe
Resource
win7-20240221-en
General
-
Target
AtXtpwIJyQWWufbN.exe
-
Size
14.2MB
-
MD5
00a57273989a40b1757b890c80c8a92a
-
SHA1
59a68061603d9e14e8f7b850329ea675ee417062
-
SHA256
7b9e81cf36ee3fb1224156663a138fc6a279a5ae61e53f59a413b3e825b9c1df
-
SHA512
d9a962e6ec98f76ad159d64f1e8351729565aa7445f4cc181bd13607ba57d2019dec5ff2f3d3d6b5f46299a14b714705eeeec5c6f1515e6ef3cc0d2946c6690b
-
SSDEEP
393216:WYJ5Qt9iFsm7tzozxGMJbGVGcZcT+FaJFAorO:WYwKFBCzgM0LAkSO
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AtXtpwIJyQWWufbN.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AtXtpwIJyQWWufbN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AtXtpwIJyQWWufbN.exe -
Deletes itself 1 IoCs
pid Process 2776 ldrupd.bin -
Executes dropped EXE 1 IoCs
pid Process 2776 ldrupd.bin -
Loads dropped DLL 5 IoCs
pid Process 1968 AtXtpwIJyQWWufbN.exe 1968 AtXtpwIJyQWWufbN.exe 2892 WerFault.exe 2892 WerFault.exe 2892 WerFault.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AtXtpwIJyQWWufbN.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2776 1968 AtXtpwIJyQWWufbN.exe 28 PID 1968 wrote to memory of 2776 1968 AtXtpwIJyQWWufbN.exe 28 PID 1968 wrote to memory of 2776 1968 AtXtpwIJyQWWufbN.exe 28 PID 2776 wrote to memory of 2892 2776 ldrupd.bin 29 PID 2776 wrote to memory of 2892 2776 ldrupd.bin 29 PID 2776 wrote to memory of 2892 2776 ldrupd.bin 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\AtXtpwIJyQWWufbN.exe"C:\Users\Admin\AppData\Local\Temp\AtXtpwIJyQWWufbN.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\ldrupd.bin"C:\Users\Admin\AppData\Local\ldrupd.bin"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2776 -s 1003⤵
- Loads dropped DLL
PID:2892
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a24978a6b77e2cd99823e24c6eb4d055
SHA105aab593ba8e0c21f2859d04d4810fdd1ce453c3
SHA25680ac94c086eb6e52bc3bbebd86e0795f6cb7476153af0c767b9ae4b7e9931140
SHA51224356ce42d0fd7839166416604fd7bd101cab8754de095676c921bfb664bc110e8a87cb863afefb5fd98450496c1b3e303851943f13a3e19f206350239c2a8db