Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe
Resource
win7-20240611-en
General
-
Target
a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe
-
Size
17.6MB
-
MD5
09936bec5ef511e3faf6cf174df4345b
-
SHA1
90602dbf90f192207efede8772398f90aea79ec3
-
SHA256
a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005
-
SHA512
22582ce6cebb938241e7c7d5d89468fda1e09b1569ce78b6f78a922a2b263f88b838a79cf3ee6effa8701f9ee5d5c8fc44b269c43a34d5b0950b88c3ff030fc5
-
SSDEEP
393216:gYZf5+zosIYmy8CcnsOapxtH+MLMzylBGFlR03ptEPdR7u:NZf5+0lLPnVapxtxMzylB+0kdc
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe -
Deletes itself 1 IoCs
pid Process 1672 ldrupd.bin -
Executes dropped EXE 1 IoCs
pid Process 1672 ldrupd.bin -
Loads dropped DLL 5 IoCs
pid Process 1768 a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe 1768 a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe 2640 WerFault.exe 2640 WerFault.exe 2640 WerFault.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLoadDriverPrivilege 1768 a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe Token: SeSystemEnvironmentPrivilege 1768 a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1768 wrote to memory of 3000 1768 a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe 28 PID 1768 wrote to memory of 3000 1768 a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe 28 PID 1768 wrote to memory of 3000 1768 a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe 28 PID 1768 wrote to memory of 3000 1768 a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe 28 PID 1768 wrote to memory of 2104 1768 a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe 29 PID 1768 wrote to memory of 2104 1768 a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe 29 PID 1768 wrote to memory of 2104 1768 a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe 29 PID 1768 wrote to memory of 2104 1768 a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe 29 PID 1768 wrote to memory of 1672 1768 a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe 30 PID 1768 wrote to memory of 1672 1768 a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe 30 PID 1768 wrote to memory of 1672 1768 a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe 30 PID 1672 wrote to memory of 2640 1672 ldrupd.bin 31 PID 1672 wrote to memory of 2640 1672 ldrupd.bin 31 PID 1672 wrote to memory of 2640 1672 ldrupd.bin 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe"C:\Users\Admin\AppData\Local\Temp\a61f68dcbe11d67c67a3e15bd65b0404ca40b5dce96128fdcd447395fe5be005.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵PID:3000
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵PID:2104
-
-
C:\Users\Admin\AppData\Local\ldrupd.bin"C:\Users\Admin\AppData\Local\ldrupd.bin"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1672 -s 1003⤵
- Loads dropped DLL
PID:2640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a24978a6b77e2cd99823e24c6eb4d055
SHA105aab593ba8e0c21f2859d04d4810fdd1ce453c3
SHA25680ac94c086eb6e52bc3bbebd86e0795f6cb7476153af0c767b9ae4b7e9931140
SHA51224356ce42d0fd7839166416604fd7bd101cab8754de095676c921bfb664bc110e8a87cb863afefb5fd98450496c1b3e303851943f13a3e19f206350239c2a8db