Overview
overview
10Static
static
341c38b28a9...18.exe
windows7-x64
1041c38b28a9...18.exe
windows10-2004-x64
10$1/Outbrea...39.exe
windows7-x64
9$1/Outbrea...39.exe
windows10-2004-x64
9$1/Softwar...95.exe
windows7-x64
10$1/Softwar...95.exe
windows10-2004-x64
10$1/Softwar...84.exe
windows7-x64
9$1/Softwar...84.exe
windows10-2004-x64
9$1/Softwar...re.exe
windows7-x64
$1/Softwar...re.exe
windows10-2004-x64
$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 14:05
Static task
static1
Behavioral task
behavioral1
Sample
41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$1/Outbreak/Pigeon_39.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$1/Outbreak/Pigeon_39.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$1/Software/Crew_95.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$1/Software/Crew_95.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$1/Software/Glad_84.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
$1/Software/Glad_84.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$1/Software/software.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$1/Software/software.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
General
-
Target
$1/Outbreak/Pigeon_39.exe
-
Size
6.8MB
-
MD5
f7958823d5a3c0a2df7974adde4028d0
-
SHA1
bb4e28ce33d1d1346c9916593d2760596eec0cc2
-
SHA256
72a310904f5c29c586eceff7a2442dc50e82c5a0673ac62e07c793333803f0e5
-
SHA512
5d65bf146d76f0d24599e95d6b222125d717bf6a94c58034cb09a96380b92b6a672a54987acebca83ba1f9dc78ab1947fa3c9cc5856f08a0042673b78fcf9171
-
SSDEEP
196608:g/xq66y1wQplnbnZVztYtArKIF20GsbYr9vyKHRo:wx1i29bnZYtAWmeyqo
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Pigeon_39.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ RealtekSb.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RealtekSb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RealtekSb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Pigeon_39.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Pigeon_39.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RealtekSb.lnk Pigeon_39.exe -
Executes dropped EXE 1 IoCs
pid Process 4916 RealtekSb.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine Pigeon_39.exe Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine RealtekSb.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1512 Pigeon_39.exe 4916 RealtekSb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4916 RealtekSb.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1512 Pigeon_39.exe 1512 Pigeon_39.exe 4916 RealtekSb.exe 4916 RealtekSb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1512 wrote to memory of 4916 1512 Pigeon_39.exe 89 PID 1512 wrote to memory of 4916 1512 Pigeon_39.exe 89 PID 1512 wrote to memory of 4916 1512 Pigeon_39.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\$1\Outbreak\Pigeon_39.exe"C:\Users\Admin\AppData\Local\Temp\$1\Outbreak\Pigeon_39.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Roaming\Realtek Sound Blaster\RealtekSb.exe"C:\Users\Admin\AppData\Roaming\Realtek Sound Blaster\RealtekSb.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.8MB
MD5f7958823d5a3c0a2df7974adde4028d0
SHA1bb4e28ce33d1d1346c9916593d2760596eec0cc2
SHA25672a310904f5c29c586eceff7a2442dc50e82c5a0673ac62e07c793333803f0e5
SHA5125d65bf146d76f0d24599e95d6b222125d717bf6a94c58034cb09a96380b92b6a672a54987acebca83ba1f9dc78ab1947fa3c9cc5856f08a0042673b78fcf9171