Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240611-en
  • resource tags

    arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24-06-2024 16:28

General

  • Target

    3dbb8aa00e1cb82555860839271560e1d701e4c7cb1a6211e808ba91bb106034.exe

  • Size

    2.3MB

  • MD5

    d6f71c348a73e9cde5155f26b82c88b2

  • SHA1

    89e4b53a9eecb6f532d9f71d9c4d9927436252bf

  • SHA256

    3dbb8aa00e1cb82555860839271560e1d701e4c7cb1a6211e808ba91bb106034

  • SHA512

    21795b17b3ff7d1060aa12cd98bd5931b1b3bfff7e4d70f9601f58ade87205ed0db0e9a79a7170c3f3f3b3b04d51204a043cf4f0dae40632c56fb1cf72097cf4

  • SSDEEP

    49152:pzMhj5qobyRgmwWf/qsJ8zZNgY4Z1hhy7risGEpv3Yw2jNj5+/5u:JoO5yHz34d0dI76/

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3dbb8aa00e1cb82555860839271560e1d701e4c7cb1a6211e808ba91bb106034.exe
    "C:\Users\Admin\AppData\Local\Temp\3dbb8aa00e1cb82555860839271560e1d701e4c7cb1a6211e808ba91bb106034.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4440-0-0x0000000000EC0000-0x0000000001490000-memory.dmp

    Filesize

    5.8MB

  • memory/4440-1-0x0000000076F06000-0x0000000076F08000-memory.dmp

    Filesize

    8KB

  • memory/4440-2-0x0000000000EC1000-0x0000000000F6D000-memory.dmp

    Filesize

    688KB

  • memory/4440-3-0x0000000000EC0000-0x0000000001490000-memory.dmp

    Filesize

    5.8MB

  • memory/4440-4-0x0000000000EC0000-0x0000000001490000-memory.dmp

    Filesize

    5.8MB

  • memory/4440-5-0x0000000000EC0000-0x0000000001490000-memory.dmp

    Filesize

    5.8MB

  • memory/4440-6-0x0000000000EC0000-0x0000000001490000-memory.dmp

    Filesize

    5.8MB

  • memory/4440-7-0x0000000000EC0000-0x0000000001490000-memory.dmp

    Filesize

    5.8MB

  • memory/4440-8-0x0000000000EC0000-0x0000000001490000-memory.dmp

    Filesize

    5.8MB

  • memory/4440-9-0x0000000000EC0000-0x0000000001490000-memory.dmp

    Filesize

    5.8MB

  • memory/4440-10-0x0000000000EC0000-0x0000000001490000-memory.dmp

    Filesize

    5.8MB

  • memory/4440-11-0x0000000000EC0000-0x0000000001490000-memory.dmp

    Filesize

    5.8MB

  • memory/4440-12-0x0000000000EC0000-0x0000000001490000-memory.dmp

    Filesize

    5.8MB

  • memory/4440-13-0x0000000000EC0000-0x0000000001490000-memory.dmp

    Filesize

    5.8MB

  • memory/4440-14-0x0000000000EC0000-0x0000000001490000-memory.dmp

    Filesize

    5.8MB

  • memory/4440-15-0x0000000000EC0000-0x0000000001490000-memory.dmp

    Filesize

    5.8MB

  • memory/4440-16-0x0000000000EC0000-0x0000000001490000-memory.dmp

    Filesize

    5.8MB

  • memory/4440-17-0x0000000000EC0000-0x0000000001490000-memory.dmp

    Filesize

    5.8MB

  • memory/4440-18-0x0000000000EC0000-0x0000000001490000-memory.dmp

    Filesize

    5.8MB

  • memory/4440-19-0x0000000000EC0000-0x0000000001490000-memory.dmp

    Filesize

    5.8MB

  • memory/4440-20-0x0000000000EC0000-0x0000000001490000-memory.dmp

    Filesize

    5.8MB

  • memory/4440-21-0x0000000000EC0000-0x0000000001490000-memory.dmp

    Filesize

    5.8MB