Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 03:10
Behavioral task
behavioral1
Sample
tywtQU.exe
Resource
win7-20240705-en
General
-
Target
tywtQU.exe
-
Size
21.3MB
-
MD5
6942076bd2d552f67e24b7ad18b21e69
-
SHA1
f041b16fb1707654557b7ea7b91294163aceb539
-
SHA256
cbde45013b47a0b4bfe13d434bc224483942dae6c169600893ff4d55e7e41482
-
SHA512
44454452a1e818c93ae619abfb4a4cab447605beeb379af53a97f65332dbf8f91aa1dffcb3247df8903755dd1dc15538cf8a038fb0965b50b57698c38694bbed
-
SSDEEP
393216:UfQUu1r5500XlU1XeorjN8Tx95zVEOONK2GQsxmr6WOrVOtX9lpiMxjNw:U7u1z00XsXPrjN8l3CNKrQsxmrROrYt+
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ tywtQU.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tywtQU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tywtQU.exe -
Loads dropped DLL 2 IoCs
pid Process 2368 tywtQU.exe 2368 tywtQU.exe -
resource yara_rule behavioral1/memory/2368-3-0x000000013FB20000-0x0000000143335000-memory.dmp themida behavioral1/memory/2368-5-0x000000013FB20000-0x0000000143335000-memory.dmp themida behavioral1/memory/2368-4-0x000000013FB20000-0x0000000143335000-memory.dmp themida behavioral1/memory/2368-37-0x000000013FB20000-0x0000000143335000-memory.dmp themida behavioral1/memory/2368-39-0x000000013FB20000-0x0000000143335000-memory.dmp themida behavioral1/memory/2368-38-0x000000013FB20000-0x0000000143335000-memory.dmp themida behavioral1/memory/2368-166-0x000000013FB20000-0x0000000143335000-memory.dmp themida behavioral1/memory/2368-167-0x000000013FB20000-0x0000000143335000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tywtQU.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2368 tywtQU.exe 2368 tywtQU.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1900 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2368 tywtQU.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2368 tywtQU.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2620 2368 tywtQU.exe 32 PID 2368 wrote to memory of 2620 2368 tywtQU.exe 32 PID 2368 wrote to memory of 2620 2368 tywtQU.exe 32 PID 2368 wrote to memory of 1404 2368 tywtQU.exe 33 PID 2368 wrote to memory of 1404 2368 tywtQU.exe 33 PID 2368 wrote to memory of 1404 2368 tywtQU.exe 33 PID 1404 wrote to memory of 1336 1404 cmd.exe 34 PID 1404 wrote to memory of 1336 1404 cmd.exe 34 PID 1404 wrote to memory of 1336 1404 cmd.exe 34 PID 1336 wrote to memory of 1900 1336 cmd.exe 36 PID 1336 wrote to memory of 1900 1336 cmd.exe 36 PID 1336 wrote to memory of 1900 1336 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\tywtQU.exe"C:\Users\Admin\AppData\Local\Temp\tywtQU.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵PID:2620
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd /C "color 4 && title Auth-Error && echo [DB-FOX] security issue 0x2 with ''. && timeout /t 5"2⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\system32\cmd.execmd /C "color 4 && title Auth-Error && echo [DB-FOX] security issue 0x2 with ''. && timeout /t 5"3⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\system32\timeout.exetimeout /t 54⤵
- Delays execution with timeout.exe
PID:1900
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5542538c7cb8986fa2867045e2255976a
SHA1c3496e0a1faac9bb970308cf26f278c41a7d8ab3
SHA256454485afce1a9aa105ddd94072c63fc433c7aa378b3ebf94bf3c6e1a56fcfb54
SHA5128726e87e644ceef4e11c271b2d66f6d399b5f19b4a7d3e9420c100c817940f1f8636026c02ec0de50294f2810df9a00560326a834a166d446705454251ea0401
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
10KB
MD52d7adffa791933d88f7e7b04558de0c2
SHA1a5fc7751c7bbfcb038b86838fffede41255304c4
SHA2569d1247485ba1865c4be7429580a5afb71e4ec8e656ee7a50bc565bf79def2880
SHA51246d308c5370e5b7ad14d42fe26d1c86fe62535ba77ea7d29cfd046fb96be8b3c296c88cea38d1e67722b4201340d307787f70599e89c44b56583ba626f93b29b