Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 04:38
Behavioral task
behavioral1
Sample
c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe
Resource
win7-20240508-en
General
-
Target
c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe
-
Size
6.6MB
-
MD5
02a7189dbb81604690c8bac9f0946557
-
SHA1
605863a7426bc3207ea2bf7d7b01ce06f0edfd8e
-
SHA256
c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed
-
SHA512
4c2812b2a1f73cc90fd3b86adf9533a0af2c1e86f282c8ca8ab977ff87fbb5ebdc36f4d3524022f447239fbb2045eb61e37c2f8ad3863edd2dedad1bc368c6e2
-
SSDEEP
98304:MAUH/O2fXSA57UpdRCufM4aJGTbbIl1+LxF7cg2CGABvoVPyuqyACXfTFY1uIb:MAUHl557ZucJI/xag9ckyRLmhb
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe -
Processes:
resource yara_rule behavioral2/memory/4856-0-0x0000000000400000-0x0000000001367000-memory.dmp themida behavioral2/memory/4856-1-0x0000000000400000-0x0000000001367000-memory.dmp themida behavioral2/memory/4856-3-0x0000000000400000-0x0000000001367000-memory.dmp themida behavioral2/memory/4856-30-0x0000000000400000-0x0000000001367000-memory.dmp themida -
Processes:
c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exepid process 4856 c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe -
Drops file in Program Files directory 15 IoCs
Processes:
c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exedescription ioc process File created C:\Program Files\JBridge\msvcr71.dll c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe File created C:\Program Files\JBridge\mfk71.dll c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe File created C:\Program Files\JBridge\plugin_name.64.dll c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe File created C:\Program Files\JBridge\Proxy32.dll c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe File created C:\Program Files\JBridge\Proxy64.dll c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe File created C:\Program Files\JBridge\auxhost64.exe c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe File created C:\Program Files\JBridge\Bridger32.dll c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe File created C:\Program Files\JBridge\mfc71.dll c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe File created C:\Program Files\JBridge\msvcp71.dll c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe File created C:\Program Files\JBridge\README.txt c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe File created C:\Program Files\JBridge\auxhost_default_settings.txt c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe File created C:\Program Files\JBridge\Bridger64.dll c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe File created C:\Program Files\JBridge\plugin_name.32.dll c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe File created C:\Program Files\JBridge\auxhost.exe c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe File created C:\Program Files\JBridge\JBridger.exe c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe -
Runs regedit.exe 5 IoCs
Processes:
regedit.exeregedit.exeregedit.exeregedit.exeregedit.exepid process 4168 regedit.exe 3332 regedit.exe 4744 regedit.exe 3300 regedit.exe 3604 regedit.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exepid process 4856 c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe 4856 c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exepid process 4856 c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe 4856 c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exedescription pid process target process PID 4856 wrote to memory of 4168 4856 c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe regedit.exe PID 4856 wrote to memory of 4168 4856 c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe regedit.exe PID 4856 wrote to memory of 3332 4856 c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe regedit.exe PID 4856 wrote to memory of 3332 4856 c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe regedit.exe PID 4856 wrote to memory of 4744 4856 c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe regedit.exe PID 4856 wrote to memory of 4744 4856 c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe regedit.exe PID 4856 wrote to memory of 3300 4856 c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe regedit.exe PID 4856 wrote to memory of 3300 4856 c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe regedit.exe PID 4856 wrote to memory of 3604 4856 c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe regedit.exe PID 4856 wrote to memory of 3604 4856 c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe regedit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe"C:\Users\Admin\AppData\Local\Temp\c6c57a03e14a28572a697f156f97ed5ac60663ec1271c754756dd335b21e9fed.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\regedit.exeregedit /s C:\Users\Admin\AppData\Local\Temp\e575b8d.tmp2⤵
- Runs regedit.exe
PID:4168
-
-
C:\Windows\regedit.exeregedit /s C:\Users\Admin\AppData\Local\Temp\e575c2b.tmp2⤵
- Runs regedit.exe
PID:3332
-
-
C:\Windows\regedit.exeregedit /s C:\Users\Admin\AppData\Local\Temp\e575c7a.tmp2⤵
- Runs regedit.exe
PID:4744
-
-
C:\Windows\regedit.exeregedit /s C:\Users\Admin\AppData\Local\Temp\e575caa.tmp2⤵
- Runs regedit.exe
PID:3300
-
-
C:\Windows\regedit.exeregedit /s C:\Users\Admin\AppData\Local\Temp\e575cca.tmp2⤵
- Runs regedit.exe
PID:3604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132B
MD5c3aa1676cadeb86b324cb568f72dbee3
SHA12948105c5b3e58c2775ae48fe658476f690bf414
SHA25682a95e78751c28f29b330ddce4001fd0c77678a8b9292fb08b8c363acface50e
SHA5128738e0ea5e9fd058e6577e566985e9666b16b7c56490814f95509faedbf89386b6f461ad96f821d8e08dc557e47a7b6c797b00973090d351e87da414e01b3ccc
-
Filesize
98B
MD5bcdf80e90522609d14fa19446bc17c87
SHA12f62ab90984ea0d4994d0e73c852521373c14a8d
SHA256de790455179daf3ab96cfefa793f5d0eaca56b45da2fd2331b8df561fa8f08b0
SHA512947a32cd6fb7b341a97d3ffc754c1037084c7f3e96e05edfe3179b58e0f3d23202e86ed5da91e6d6c8b93a1e2bd307fa0e5caf03dfb014df9f3fb7868fdf1957
-
Filesize
144B
MD50c835aeeb5cc63779f4651746898d3fb
SHA1af3b2c129bfc61beab16a11cc59fb98e7ff8c701
SHA256515883317e4dbc4d5ecfc09b32c36d3ced53e3fd5db8ebbb151bb9e0fa3e7d74
SHA5129bc848b2e94620f2af05093c81ac9d7b64603ee3259861ef03c38533f81b6741417c1b8c8cff4b09c925c0bc9db09526f9d76378c5b0cd0a42de14940ab784cd
-
Filesize
110B
MD55c26168f481a99cac00c7fd8306da658
SHA1485656263cf750d9505825ca6ba5afa4860a7103
SHA2562a9e03ea107adb8542ac32b21c28864d9c6fcc651152f72c9959498baa865e9a
SHA512b85aae30eb722a421078cb0e27f7701f128c5a4f201e948305aa23489e9868287f320eb1f72dce22f7687ac9f931744e9aa7fd0d7e335563ac8c88f000785294
-
Filesize
142B
MD53fda5d9eb00e8de27a67c26d1294b8c3
SHA17d50feb197ad5694e7ccdd8df72a4363e1bd3ecd
SHA2566b95f1d6d06d31b850dd01ccb7f723bef3d6823b93c5feb4ff2bd9236630e3ec
SHA512798db0157ddf577f27654a52b91a7c8956f3895da469f6352dc77081c83827660b0076da99c79719fe7ab5ef2013a44121dab5156292a4023e28c979d6db0302