Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 21:21

General

  • Target

    7129067bec7424dbad5e15e18f904bc940c921239ed75eb1a23eaaa525b4e9e2.exe

  • Size

    2.2MB

  • MD5

    17af1144e1ef08d93dcafe5075b3ade8

  • SHA1

    fe10d1aafa391b8394eef09954a72e39d7e36d60

  • SHA256

    7129067bec7424dbad5e15e18f904bc940c921239ed75eb1a23eaaa525b4e9e2

  • SHA512

    001f1edcb44d4574c8fd87fc72df8a60185a58a356b4c853158c9c4e0b20b0440d6e6b989bcca822b348d0c4fde6222d3c1d8be3b792b354054c0b0d70bf5159

  • SSDEEP

    49152:hu4CmV1PmeS0rBMGKCevL0XNQNElZ+dQaIXHQlVZ0qnk:hu8/Pm6FMfCew9WEz+dQ1k3k

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7129067bec7424dbad5e15e18f904bc940c921239ed75eb1a23eaaa525b4e9e2.exe
    "C:\Users\Admin\AppData\Local\Temp\7129067bec7424dbad5e15e18f904bc940c921239ed75eb1a23eaaa525b4e9e2.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1736-0-0x0000000000400000-0x000000000093B000-memory.dmp

    Filesize

    5.2MB

  • memory/1736-1-0x0000000077B70000-0x0000000077B72000-memory.dmp

    Filesize

    8KB

  • memory/1736-16-0x0000000000400000-0x000000000093B000-memory.dmp

    Filesize

    5.2MB

  • memory/1736-14-0x0000000000401000-0x0000000000453000-memory.dmp

    Filesize

    328KB

  • memory/1736-17-0x0000000000400000-0x000000000093B000-memory.dmp

    Filesize

    5.2MB

  • memory/1736-13-0x0000000004560000-0x0000000004561000-memory.dmp

    Filesize

    4KB

  • memory/1736-12-0x00000000044F0000-0x00000000044F1000-memory.dmp

    Filesize

    4KB

  • memory/1736-11-0x00000000044C0000-0x00000000044C1000-memory.dmp

    Filesize

    4KB

  • memory/1736-10-0x00000000044E0000-0x00000000044E1000-memory.dmp

    Filesize

    4KB

  • memory/1736-9-0x0000000004510000-0x0000000004511000-memory.dmp

    Filesize

    4KB

  • memory/1736-8-0x0000000004580000-0x0000000004582000-memory.dmp

    Filesize

    8KB

  • memory/1736-7-0x0000000004590000-0x0000000004591000-memory.dmp

    Filesize

    4KB

  • memory/1736-6-0x00000000045A0000-0x00000000045A1000-memory.dmp

    Filesize

    4KB

  • memory/1736-5-0x0000000004520000-0x0000000004522000-memory.dmp

    Filesize

    8KB

  • memory/1736-4-0x0000000004550000-0x0000000004551000-memory.dmp

    Filesize

    4KB

  • memory/1736-3-0x00000000044D0000-0x00000000044D1000-memory.dmp

    Filesize

    4KB

  • memory/1736-2-0x00000000045B0000-0x00000000045B1000-memory.dmp

    Filesize

    4KB

  • memory/1736-18-0x0000000000400000-0x000000000093B000-memory.dmp

    Filesize

    5.2MB