Analysis
-
max time kernel
154s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
647745aa487b5264eb705bd68702fce9969ee121ee758880d9fb4d16a00a2b06.exe
Resource
win7-20240419-en
General
-
Target
647745aa487b5264eb705bd68702fce9969ee121ee758880d9fb4d16a00a2b06.exe
-
Size
12.8MB
-
MD5
0575a9d7c5c967d702e769383aed1b1a
-
SHA1
8d343acb2a165ba4b89d8b30055213f5a9c704a1
-
SHA256
647745aa487b5264eb705bd68702fce9969ee121ee758880d9fb4d16a00a2b06
-
SHA512
e14391c8bd6587c9f9fd762e6b5f3e7b81ba3b57526741564e2ee0a920b5ebcdee663a4a8304c7c31bc642a5bf23c7add5aba5aeb37f36f39de82544d5f0988e
-
SSDEEP
196608:GMFCe4pJMLfYBrW1uyZZSH1kzK0OA97RUUvedIhAWP4cVyBPqwKfltgl0BlCxpxi:/mpJAfkrWaVuj2dytuPwf0ljpsNV
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 647745aa487b5264eb705bd68702fce9969ee121ee758880d9fb4d16a00a2b06.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 647745aa487b5264eb705bd68702fce9969ee121ee758880d9fb4d16a00a2b06.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 647745aa487b5264eb705bd68702fce9969ee121ee758880d9fb4d16a00a2b06.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 647745aa487b5264eb705bd68702fce9969ee121ee758880d9fb4d16a00a2b06.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 647745aa487b5264eb705bd68702fce9969ee121ee758880d9fb4d16a00a2b06.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4000 647745aa487b5264eb705bd68702fce9969ee121ee758880d9fb4d16a00a2b06.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\WOW6432Node\CLSID\{9689eab6-ee9d-2386-376d-0410cd1a} 647745aa487b5264eb705bd68702fce9969ee121ee758880d9fb4d16a00a2b06.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\WOW6432Node\CLSID\{9689eab6-ee9d-2386-376d-0410cd1a}\SortOrderIndex = 226c55a4cbe913a3f25e5cab 647745aa487b5264eb705bd68702fce9969ee121ee758880d9fb4d16a00a2b06.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4000 647745aa487b5264eb705bd68702fce9969ee121ee758880d9fb4d16a00a2b06.exe 4000 647745aa487b5264eb705bd68702fce9969ee121ee758880d9fb4d16a00a2b06.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4000 wrote to memory of 4380 4000 647745aa487b5264eb705bd68702fce9969ee121ee758880d9fb4d16a00a2b06.exe 92 PID 4000 wrote to memory of 4380 4000 647745aa487b5264eb705bd68702fce9969ee121ee758880d9fb4d16a00a2b06.exe 92 PID 4000 wrote to memory of 4380 4000 647745aa487b5264eb705bd68702fce9969ee121ee758880d9fb4d16a00a2b06.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\647745aa487b5264eb705bd68702fce9969ee121ee758880d9fb4d16a00a2b06.exe"C:\Users\Admin\AppData\Local\Temp\647745aa487b5264eb705bd68702fce9969ee121ee758880d9fb4d16a00a2b06.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c color 0a2⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4072 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:81⤵PID:3716