Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 04:59

General

  • Target

    996e186ba608ba27f653d3aed739409ef63975305762582d64b8d5b0a1de95a1.exe

  • Size

    12.3MB

  • MD5

    294e8b28cb6d1ff9e57d4f82d696b800

  • SHA1

    b205734e67213dc440f47786e51029dfb0ddf6bc

  • SHA256

    996e186ba608ba27f653d3aed739409ef63975305762582d64b8d5b0a1de95a1

  • SHA512

    7d21a1715f16ed290149c13d89e553e47e11e54a57b474091cf9b8858383649511f2f3fece8014f1322c7982b3c0b2166bcd767644b913490c525954faeeecc5

  • SSDEEP

    393216:ymtxYM6QuPQDYhB3lijQyhAY/TxhsMf2Ky4OAvIp:fOM6pYDWDaQyhAY7Ic2KKT

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Windows directory 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\996e186ba608ba27f653d3aed739409ef63975305762582d64b8d5b0a1de95a1.exe
    "C:\Users\Admin\AppData\Local\Temp\996e186ba608ba27f653d3aed739409ef63975305762582d64b8d5b0a1de95a1.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Writes to the Master Boot Record (MBR)
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\TarC910.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • \Users\Admin\AppData\Local\Temp\794413c6.dll
    Filesize

    8KB

    MD5

    e1db733e43aa8d065fb7e8669db76524

    SHA1

    3f9c62ee28959959271632fdc7f5387d539a1d23

    SHA256

    9e65d9e8ebb895f3b03c95ce64f044c70251fff444a4bcbee83f558b599a614d

    SHA512

    3f6106f32932e72d197865f7b796eba072c8ab20c22b4d205f27de9b9fc6c139be8450ae25541fbdac37a06bc3ec2d1fab3f9b3216201a9231b70fcde6fb8eb3

  • \Users\Admin\AppData\Local\Temp\KRwin.dll
    Filesize

    3.8MB

    MD5

    a1398812c07ad391c76b8f54e42c9e94

    SHA1

    5a226485386e087104e2133b9ef8fce89fae0c7f

    SHA256

    1c7d596364ce5132a2277f30e92aa8af76f054101d89346f133c2f9857663608

    SHA512

    36c82ccff5f8216d7028c814a3d4d35bbba8b987bea29b92c1ca68ce5f4f54fb3dc1aa351bebcf505365d6e0393ef75b726367ba0af1daae45b107015dd0d42a

  • memory/2236-14-0x00000000008D0000-0x0000000002609000-memory.dmp
    Filesize

    29.2MB

  • memory/2236-133-0x0000000075E70000-0x0000000075F80000-memory.dmp
    Filesize

    1.1MB

  • memory/2236-13-0x0000000075E70000-0x0000000075F80000-memory.dmp
    Filesize

    1.1MB

  • memory/2236-46-0x00000000008D0000-0x0000000002609000-memory.dmp
    Filesize

    29.2MB

  • memory/2236-12-0x0000000075E70000-0x0000000075F80000-memory.dmp
    Filesize

    1.1MB

  • memory/2236-9-0x0000000075E70000-0x0000000075F80000-memory.dmp
    Filesize

    1.1MB

  • memory/2236-11-0x00000000008D0000-0x0000000002609000-memory.dmp
    Filesize

    29.2MB

  • memory/2236-17-0x0000000010000000-0x0000000010184000-memory.dmp
    Filesize

    1.5MB

  • memory/2236-0-0x00000000008D0000-0x0000000002609000-memory.dmp
    Filesize

    29.2MB

  • memory/2236-19-0x0000000004F10000-0x00000000051C3000-memory.dmp
    Filesize

    2.7MB

  • memory/2236-15-0x00000000008D0000-0x0000000002609000-memory.dmp
    Filesize

    29.2MB

  • memory/2236-16-0x00000000008D0000-0x0000000002609000-memory.dmp
    Filesize

    29.2MB

  • memory/2236-20-0x0000000004F10000-0x00000000051C3000-memory.dmp
    Filesize

    2.7MB

  • memory/2236-27-0x0000000004B70000-0x0000000004C5C000-memory.dmp
    Filesize

    944KB

  • memory/2236-7-0x0000000075E70000-0x0000000075F80000-memory.dmp
    Filesize

    1.1MB

  • memory/2236-34-0x0000000010000000-0x0000000010184000-memory.dmp
    Filesize

    1.5MB

  • memory/2236-43-0x00000000008D0000-0x0000000002609000-memory.dmp
    Filesize

    29.2MB

  • memory/2236-54-0x0000000005C10000-0x0000000006790000-memory.dmp
    Filesize

    11.5MB

  • memory/2236-47-0x00000000008D0000-0x0000000002609000-memory.dmp
    Filesize

    29.2MB

  • memory/2236-45-0x00000000008D0000-0x0000000002609000-memory.dmp
    Filesize

    29.2MB

  • memory/2236-3-0x0000000075E70000-0x0000000075F80000-memory.dmp
    Filesize

    1.1MB

  • memory/2236-50-0x0000000005C10000-0x0000000006790000-memory.dmp
    Filesize

    11.5MB

  • memory/2236-10-0x0000000075E70000-0x0000000075F80000-memory.dmp
    Filesize

    1.1MB

  • memory/2236-8-0x0000000075E70000-0x0000000075F80000-memory.dmp
    Filesize

    1.1MB

  • memory/2236-44-0x00000000008D0000-0x0000000002609000-memory.dmp
    Filesize

    29.2MB

  • memory/2236-56-0x0000000005C10000-0x0000000006790000-memory.dmp
    Filesize

    11.5MB

  • memory/2236-55-0x0000000005C10000-0x0000000006790000-memory.dmp
    Filesize

    11.5MB

  • memory/2236-58-0x0000000005C10000-0x0000000006790000-memory.dmp
    Filesize

    11.5MB

  • memory/2236-60-0x0000000005C10000-0x0000000006790000-memory.dmp
    Filesize

    11.5MB

  • memory/2236-59-0x0000000005C10000-0x0000000006790000-memory.dmp
    Filesize

    11.5MB

  • memory/2236-61-0x0000000005C10000-0x0000000006790000-memory.dmp
    Filesize

    11.5MB

  • memory/2236-57-0x0000000005C10000-0x0000000006790000-memory.dmp
    Filesize

    11.5MB

  • memory/2236-62-0x00000000008D0000-0x0000000002609000-memory.dmp
    Filesize

    29.2MB

  • memory/2236-63-0x0000000075E84000-0x0000000075E85000-memory.dmp
    Filesize

    4KB

  • memory/2236-64-0x0000000075E70000-0x0000000075F80000-memory.dmp
    Filesize

    1.1MB

  • memory/2236-65-0x0000000075E70000-0x0000000075F80000-memory.dmp
    Filesize

    1.1MB

  • memory/2236-68-0x0000000005C10000-0x0000000006790000-memory.dmp
    Filesize

    11.5MB

  • memory/2236-70-0x0000000005C10000-0x0000000006790000-memory.dmp
    Filesize

    11.5MB

  • memory/2236-72-0x0000000005C10000-0x0000000006790000-memory.dmp
    Filesize

    11.5MB

  • memory/2236-2-0x0000000075E70000-0x0000000075F80000-memory.dmp
    Filesize

    1.1MB

  • memory/2236-1-0x0000000075E84000-0x0000000075E85000-memory.dmp
    Filesize

    4KB

  • memory/2236-132-0x0000000075E70000-0x0000000075F80000-memory.dmp
    Filesize

    1.1MB

  • memory/2236-127-0x00000000008D0000-0x0000000002609000-memory.dmp
    Filesize

    29.2MB

  • memory/2236-53-0x0000000005C10000-0x0000000006790000-memory.dmp
    Filesize

    11.5MB

  • memory/2236-131-0x0000000005C10000-0x0000000006790000-memory.dmp
    Filesize

    11.5MB