Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 03:44
Static task
static1
Behavioral task
behavioral1
Sample
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe
Resource
win10v2004-20240508-en
General
-
Target
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe
-
Size
10.0MB
-
MD5
c586088cd9ab88ae3f5c9219d5745828
-
SHA1
eece71d732fed6484a8ddb22a5aa0eded21279ed
-
SHA256
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232
-
SHA512
d7f986f6d578db7eed000c94e584719bbcefbe648b4267aa82bbd37228f4e475c70be6d33909e703d55bd5a3eeb5a83f4f9c0132a4cc8f8f1ae6494ddcb4aece
-
SSDEEP
196608:0FNkDWNGJiniFR78vqsd8n7B38vfUYA5H+LX34Z2vqA2:/DPU4YvVd4ycBHI4Z8j2
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exeRunner.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Runner.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exeRunner.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Runner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Runner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe -
Executes dropped EXE 1 IoCs
Processes:
Runner.exepid process 2572 Runner.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exeRunner.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Wine f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Wine Runner.exe -
Loads dropped DLL 6 IoCs
Processes:
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exeRunner.exepid process 1972 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe 1972 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe 1972 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe 2572 Runner.exe 2572 Runner.exe 2572 Runner.exe -
Drops file in Windows directory 1 IoCs
Processes:
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exedescription ioc process File opened for modification C:\Windows\win.ini f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 48 IoCs
Processes:
Runner.exef06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\ProgID\ = "QMDispatch.QMLibrary" Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MyMacro.MyGUIMacroControlServer f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MyMacro.MyGUIMacroControlServer\ = "MyMacro.MyGUIMacroControlServer" f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DACDED71-1201-4F76-9C30-BDA795A55678}\ = "MyMacro.MyGUIMacroControlServer" f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMVBSRoutine\CLSID\ = "{241D7F03-9232-4024-8373-149860BE27C0}" Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InProcServer32 Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DACDED71-1201-4F76-9C30-BDA795A55678} f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\ = "QMDispatch.QMRoutine" Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\InProcServer32\ThreadingModel = "Apartment" Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DACDED71-1201-4F76-9C30-BDA795A55678}\InprocHandler32\ = "ole32.dll" f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DACDED71-1201-4F76-9C30-BDA795A55678}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe" f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMVBSRoutine\CLSID Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\CLSID Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\InProcServer32 Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\InProcServer32 Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\MacroCommerce\\qdisp.dll" Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\ = "QMDispatch.QMLibrary" Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MyMacro.MyGUIMacroControlServer\CLSID f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DACDED71-1201-4F76-9C30-BDA795A55678}\InprocHandler32 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMVBSRoutine Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\ = "QMDispatch.QMVBSRoutine" Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\ProgID\ = "QMDispatch.QMVBSRoutine" Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary\CLSID Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\MacroCommerce\\qdisp.dll" Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary\CLSID\ = "{EBEB87A6-E151-4054-AB45-A6E094C5334B}" Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMVBSRoutine\ = "QMDispatch.QMVBSRoutine" Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\MacroCommerce\\qdisp.dll" Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049} Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\ProgID\ = "QMDispatch.QMRoutine" Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MyMacro.MyGUIMacroControlServer\CLSID\ = "{DACDED71-1201-4F76-9C30-BDA795A55678}" f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\ = "QMDispatch.QMRoutine" Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\CLSID\ = "{C07DB6A3-34FC-4084-BE2E-76BB9203B049}" Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\ProgID Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\InProcServer32\ThreadingModel = "Apartment" Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\InprocServer32 Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InprocServer32 Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InProcServer32\ThreadingModel = "Apartment" Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DACDED71-1201-4F76-9C30-BDA795A55678}\ProgID f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0} Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\ProgID Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary\ = "QMDispatch.QMLibrary" Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B} Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\InprocServer32 Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DACDED71-1201-4F76-9C30-BDA795A55678}\ProgID\ = "MyMacro.MyGUIMacroControlServer" f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DACDED71-1201-4F76-9C30-BDA795A55678}\LocalServer32 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\ProgID Runner.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exepid process 1972 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exepid process 1972 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
Processes:
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exeRunner.exepid process 1972 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe 1972 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe 1972 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe 1972 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe 1972 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe 1972 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe 2572 Runner.exe 2572 Runner.exe 2572 Runner.exe 2572 Runner.exe 2572 Runner.exe 2572 Runner.exe 2572 Runner.exe 2572 Runner.exe 2572 Runner.exe 2572 Runner.exe 2572 Runner.exe 2572 Runner.exe 1972 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe 2572 Runner.exe 2572 Runner.exe 2572 Runner.exe 2572 Runner.exe 2572 Runner.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exedescription pid process target process PID 1972 wrote to memory of 2572 1972 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Runner.exe PID 1972 wrote to memory of 2572 1972 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Runner.exe PID 1972 wrote to memory of 2572 1972 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Runner.exe PID 1972 wrote to memory of 2572 1972 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Runner.exe PID 1972 wrote to memory of 2900 1972 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe PING.EXE PID 1972 wrote to memory of 2900 1972 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe PING.EXE PID 1972 wrote to memory of 2900 1972 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe PING.EXE PID 1972 wrote to memory of 2900 1972 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe"C:\Users\Admin\AppData\Local\Temp\f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Roaming\MyMacro\Runner.exe--host_id 5 --verify_key Nw2ZoiNzhB_F --product "C:\Users\Admin\AppData\Local\Temp\f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe" --version 2014.05.2716572⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
C:\Windows\SysWOW64\PING.EXE"C:\Windows\System32\PING.EXE" www.baidu.com -n 22⤵
- Runs ping.exe
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
337B
MD5dec2a0a2001c0d78b39c2504c903e154
SHA1522a77a3a18bdffba924364a2da3672f0cc0ed9f
SHA256b8a261add4424cab23469acbc0cf1bf5bdee53559788d964fe1104230d9813fc
SHA512b14aa52b7eb5dcdcaf684f43dfce6f8f70b5b1262e942d8f6a4d3c51868345ddf80adb26206b6a730550f89e54d1d823db125e35c3ffd4f08e68e40eb3ddc3e1
-
Filesize
518B
MD5e9bcfc58aefc9ea8008717275ac33ed1
SHA1e0e516b224a9c1083a529f94664fd8b9f302da07
SHA2562d4d96dd20cc8f050fd72ee9ec1cd70b0160d63afc277368599057675562bc7e
SHA512fa4464c5ae4ebc882ddec8154e2f1d569f878377fd864cb2696f376d9129fee9ab3bb1acc2c7bd60c28041aaf8e7304aa37bec0a8a3c8583ecd15b283c16cd34
-
Filesize
303KB
MD5014c01cd6522778e1e15be0e696dfe0c
SHA1c908376fcc4525ec5c4b35d289ef1361ea5cb2d9
SHA256259eaf1ddc9bf610d11a22413853b3d4386fc5a8412c6e602c74eb43f1a32d46
SHA5123b8d040b4a6e879ecf3bafba336b2fc8d793d4f6931902faf87e8f64faf6eca7f1f21485794cffe16c7d0ea907b9f6db93df0b4bae8cb3684733e95608523fd9
-
Filesize
7.3MB
MD5e51c4cf022ecb48837b33246eccfe153
SHA1489c21afcd01e068c4f99caf6eb1636018753691
SHA256dfc70b81341e185688e663d379df199c302fa4b9b27512ccc5cb356ef2ab95b5
SHA5129bf556eaa22656fa6746d310485b7d5c41fab53738e9d505ed40d32580993b08c95d2ddefc756e192ea359312b97dda0333129cf09ccfcad02c9dcf431d48781
-
Filesize
59KB
MD5b35416c2b3e818894df95608b76934f7
SHA1bbdd1c0f49e9ce54e9312f5edfead76d343c21cf
SHA2568147481d1c93da5ce5de7ff7a72a45756d45ea1f27d27bb8c9944642f42549a3
SHA51292382562761b36b4ed2ec0bba832c66c8f720e190630596ff830a047a498889e7a0f3628d1a3ffac066b06ccd8c2d3840e82b4304b636e1b1ee434910c6f0bdf