Analysis
-
max time kernel
34s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 20:26
Static task
static1
Behavioral task
behavioral1
Sample
AtXtpwIJyQWWufbN.exe
Resource
win7-20240221-en
General
-
Target
AtXtpwIJyQWWufbN.exe
-
Size
14.2MB
-
MD5
00a57273989a40b1757b890c80c8a92a
-
SHA1
59a68061603d9e14e8f7b850329ea675ee417062
-
SHA256
7b9e81cf36ee3fb1224156663a138fc6a279a5ae61e53f59a413b3e825b9c1df
-
SHA512
d9a962e6ec98f76ad159d64f1e8351729565aa7445f4cc181bd13607ba57d2019dec5ff2f3d3d6b5f46299a14b714705eeeec5c6f1515e6ef3cc0d2946c6690b
-
SSDEEP
393216:WYJ5Qt9iFsm7tzozxGMJbGVGcZcT+FaJFAorO:WYwKFBCzgM0LAkSO
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AtXtpwIJyQWWufbN.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AtXtpwIJyQWWufbN.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AtXtpwIJyQWWufbN.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AtXtpwIJyQWWufbN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AtXtpwIJyQWWufbN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AtXtpwIJyQWWufbN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AtXtpwIJyQWWufbN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AtXtpwIJyQWWufbN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AtXtpwIJyQWWufbN.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation ldrupd.bin Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation ldrupd.bin -
Deletes itself 1 IoCs
pid Process 2488 ldrupd.bin -
Executes dropped EXE 4 IoCs
pid Process 2488 ldrupd.bin 4636 AtXtpwIJyQWWufbN.exe 4812 ldrupd.bin 3028 AtXtpwIJyQWWufbN.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AtXtpwIJyQWWufbN.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AtXtpwIJyQWWufbN.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AtXtpwIJyQWWufbN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3028 AtXtpwIJyQWWufbN.exe 3028 AtXtpwIJyQWWufbN.exe 3028 AtXtpwIJyQWWufbN.exe 3028 AtXtpwIJyQWWufbN.exe 3028 AtXtpwIJyQWWufbN.exe 3028 AtXtpwIJyQWWufbN.exe 3028 AtXtpwIJyQWWufbN.exe 3028 AtXtpwIJyQWWufbN.exe 3028 AtXtpwIJyQWWufbN.exe 3028 AtXtpwIJyQWWufbN.exe 3028 AtXtpwIJyQWWufbN.exe 3028 AtXtpwIJyQWWufbN.exe 3028 AtXtpwIJyQWWufbN.exe 3028 AtXtpwIJyQWWufbN.exe 3028 AtXtpwIJyQWWufbN.exe 3028 AtXtpwIJyQWWufbN.exe 3028 AtXtpwIJyQWWufbN.exe 3028 AtXtpwIJyQWWufbN.exe 3028 AtXtpwIJyQWWufbN.exe 3028 AtXtpwIJyQWWufbN.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSystemEnvironmentPrivilege 4636 AtXtpwIJyQWWufbN.exe Token: SeSystemEnvironmentPrivilege 3028 AtXtpwIJyQWWufbN.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4636 AtXtpwIJyQWWufbN.exe 4812 ldrupd.bin 3028 AtXtpwIJyQWWufbN.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 5040 wrote to memory of 2488 5040 AtXtpwIJyQWWufbN.exe 86 PID 5040 wrote to memory of 2488 5040 AtXtpwIJyQWWufbN.exe 86 PID 2488 wrote to memory of 4636 2488 ldrupd.bin 87 PID 2488 wrote to memory of 4636 2488 ldrupd.bin 87 PID 4636 wrote to memory of 1456 4636 AtXtpwIJyQWWufbN.exe 89 PID 4636 wrote to memory of 1456 4636 AtXtpwIJyQWWufbN.exe 89 PID 4636 wrote to memory of 1456 4636 AtXtpwIJyQWWufbN.exe 89 PID 4636 wrote to memory of 2660 4636 AtXtpwIJyQWWufbN.exe 90 PID 4636 wrote to memory of 2660 4636 AtXtpwIJyQWWufbN.exe 90 PID 4636 wrote to memory of 2660 4636 AtXtpwIJyQWWufbN.exe 90 PID 4636 wrote to memory of 4812 4636 AtXtpwIJyQWWufbN.exe 91 PID 4636 wrote to memory of 4812 4636 AtXtpwIJyQWWufbN.exe 91 PID 4812 wrote to memory of 3028 4812 ldrupd.bin 92 PID 4812 wrote to memory of 3028 4812 ldrupd.bin 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\AtXtpwIJyQWWufbN.exe"C:\Users\Admin\AppData\Local\Temp\AtXtpwIJyQWWufbN.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\ldrupd.bin"C:\Users\Admin\AppData\Local\ldrupd.bin"2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\AtXtpwIJyQWWufbN.exe"C:\Users\Admin\AppData\Local\Temp\AtXtpwIJyQWWufbN.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"4⤵PID:1456
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"4⤵PID:2660
-
-
C:\Users\Admin\AppData\Local\ldrupd.bin"C:\Users\Admin\AppData\Local\ldrupd.bin"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\AtXtpwIJyQWWufbN.exe"C:\Users\Admin\AppData\Local\Temp\AtXtpwIJyQWWufbN.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3028
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17.4MB
MD5ce2bb757b16717e50875904da36d7fd8
SHA10f0c818ac845646fdcb211e181358c376f50208a
SHA256c09297d5ecbb73f2c03b2085e75943f8921f9fd8e5da9a382c891a057b715669
SHA512d57041f282823022494eba00789fbdbc8d047ac7a53368eae4513970847c764335580f7ad232b887a686dbf4fe7d6a22e86abed23ea68c954c7ef08059a164a2
-
Filesize
13.7MB
MD5a2413a3cf43c46c19da14ff649225938
SHA14a9e8cb3eef839b10625616681da62d13200fccc
SHA25669f3bf2b05b8f616594310132b40cda03e5680267f8e64575c5fd5e3151d10a8
SHA512df18f57c0149443581b915a01aa0e0ac14ffdb1b3f3bc7dabd9608dcb87910298b36d4c86208ffe9a02f17366c53c7e56363ba4058c383bf88be0a189e1fd80c
-
Filesize
3KB
MD5a24978a6b77e2cd99823e24c6eb4d055
SHA105aab593ba8e0c21f2859d04d4810fdd1ce453c3
SHA25680ac94c086eb6e52bc3bbebd86e0795f6cb7476153af0c767b9ae4b7e9931140
SHA51224356ce42d0fd7839166416604fd7bd101cab8754de095676c921bfb664bc110e8a87cb863afefb5fd98450496c1b3e303851943f13a3e19f206350239c2a8db