Analysis
-
max time kernel
57s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 01:45
Behavioral task
behavioral1
Sample
Mac.exe
Resource
win10v2004-20240709-en
General
-
Target
Mac.exe
-
Size
2.8MB
-
MD5
968ba4b5549e08605049d5d126406c5a
-
SHA1
b6204e980656a3465be1a93e274ef9e263cef189
-
SHA256
ad1e8e8f42d7db9753ec0faaff70224866140845ef775fbd97a5246e7e64f902
-
SHA512
c27851a92ff09e278ed74b38cbe31b6b8b472a287981860767ebd4b4ae212b80cb82a0f97e7397d436913153b163710241151bdb789d7c0e49c8a287ac3baa0c
-
SSDEEP
49152:7ACyWLMURxAxsjSmlFHQyeN27hvIP2BJD0mfsmBrOHG9vCPdk0BjTEqAh:7OyRx95FHNeNKVHJ4mf1q+Ik0VTpG
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Mac.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Mac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Mac.exe -
resource yara_rule behavioral1/memory/3208-0-0x00007FF722160000-0x00007FF72284F000-memory.dmp themida behavioral1/memory/3208-3-0x00007FF722160000-0x00007FF72284F000-memory.dmp themida behavioral1/memory/3208-2-0x00007FF722160000-0x00007FF72284F000-memory.dmp themida behavioral1/memory/3208-5-0x00007FF722160000-0x00007FF72284F000-memory.dmp themida behavioral1/memory/3208-4-0x00007FF722160000-0x00007FF72284F000-memory.dmp themida behavioral1/memory/3208-7-0x00007FF722160000-0x00007FF72284F000-memory.dmp themida behavioral1/memory/3208-6-0x00007FF722160000-0x00007FF72284F000-memory.dmp themida behavioral1/memory/3208-16-0x00007FF722160000-0x00007FF72284F000-memory.dmp themida behavioral1/memory/3208-19-0x00007FF722160000-0x00007FF72284F000-memory.dmp themida behavioral1/memory/3208-20-0x00007FF722160000-0x00007FF72284F000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Mac.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3208 Mac.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\MAC.bat Mac.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2528 WMIC.exe Token: SeSecurityPrivilege 2528 WMIC.exe Token: SeTakeOwnershipPrivilege 2528 WMIC.exe Token: SeLoadDriverPrivilege 2528 WMIC.exe Token: SeSystemProfilePrivilege 2528 WMIC.exe Token: SeSystemtimePrivilege 2528 WMIC.exe Token: SeProfSingleProcessPrivilege 2528 WMIC.exe Token: SeIncBasePriorityPrivilege 2528 WMIC.exe Token: SeCreatePagefilePrivilege 2528 WMIC.exe Token: SeBackupPrivilege 2528 WMIC.exe Token: SeRestorePrivilege 2528 WMIC.exe Token: SeShutdownPrivilege 2528 WMIC.exe Token: SeDebugPrivilege 2528 WMIC.exe Token: SeSystemEnvironmentPrivilege 2528 WMIC.exe Token: SeRemoteShutdownPrivilege 2528 WMIC.exe Token: SeUndockPrivilege 2528 WMIC.exe Token: SeManageVolumePrivilege 2528 WMIC.exe Token: 33 2528 WMIC.exe Token: 34 2528 WMIC.exe Token: 35 2528 WMIC.exe Token: 36 2528 WMIC.exe Token: SeIncreaseQuotaPrivilege 2528 WMIC.exe Token: SeSecurityPrivilege 2528 WMIC.exe Token: SeTakeOwnershipPrivilege 2528 WMIC.exe Token: SeLoadDriverPrivilege 2528 WMIC.exe Token: SeSystemProfilePrivilege 2528 WMIC.exe Token: SeSystemtimePrivilege 2528 WMIC.exe Token: SeProfSingleProcessPrivilege 2528 WMIC.exe Token: SeIncBasePriorityPrivilege 2528 WMIC.exe Token: SeCreatePagefilePrivilege 2528 WMIC.exe Token: SeBackupPrivilege 2528 WMIC.exe Token: SeRestorePrivilege 2528 WMIC.exe Token: SeShutdownPrivilege 2528 WMIC.exe Token: SeDebugPrivilege 2528 WMIC.exe Token: SeSystemEnvironmentPrivilege 2528 WMIC.exe Token: SeRemoteShutdownPrivilege 2528 WMIC.exe Token: SeUndockPrivilege 2528 WMIC.exe Token: SeManageVolumePrivilege 2528 WMIC.exe Token: 33 2528 WMIC.exe Token: 34 2528 WMIC.exe Token: 35 2528 WMIC.exe Token: 36 2528 WMIC.exe Token: SeIncreaseQuotaPrivilege 3064 WMIC.exe Token: SeSecurityPrivilege 3064 WMIC.exe Token: SeTakeOwnershipPrivilege 3064 WMIC.exe Token: SeLoadDriverPrivilege 3064 WMIC.exe Token: SeSystemProfilePrivilege 3064 WMIC.exe Token: SeSystemtimePrivilege 3064 WMIC.exe Token: SeProfSingleProcessPrivilege 3064 WMIC.exe Token: SeIncBasePriorityPrivilege 3064 WMIC.exe Token: SeCreatePagefilePrivilege 3064 WMIC.exe Token: SeBackupPrivilege 3064 WMIC.exe Token: SeRestorePrivilege 3064 WMIC.exe Token: SeShutdownPrivilege 3064 WMIC.exe Token: SeDebugPrivilege 3064 WMIC.exe Token: SeSystemEnvironmentPrivilege 3064 WMIC.exe Token: SeRemoteShutdownPrivilege 3064 WMIC.exe Token: SeUndockPrivilege 3064 WMIC.exe Token: SeManageVolumePrivilege 3064 WMIC.exe Token: 33 3064 WMIC.exe Token: 34 3064 WMIC.exe Token: 35 3064 WMIC.exe Token: 36 3064 WMIC.exe Token: SeIncreaseQuotaPrivilege 3064 WMIC.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3208 wrote to memory of 4164 3208 Mac.exe 88 PID 3208 wrote to memory of 4164 3208 Mac.exe 88 PID 3208 wrote to memory of 2964 3208 Mac.exe 89 PID 3208 wrote to memory of 2964 3208 Mac.exe 89 PID 2964 wrote to memory of 3820 2964 cmd.exe 90 PID 2964 wrote to memory of 3820 2964 cmd.exe 90 PID 2964 wrote to memory of 2316 2964 cmd.exe 91 PID 2964 wrote to memory of 2316 2964 cmd.exe 91 PID 2964 wrote to memory of 632 2964 cmd.exe 92 PID 2964 wrote to memory of 632 2964 cmd.exe 92 PID 3208 wrote to memory of 2524 3208 Mac.exe 99 PID 3208 wrote to memory of 2524 3208 Mac.exe 99 PID 3208 wrote to memory of 2844 3208 Mac.exe 100 PID 3208 wrote to memory of 2844 3208 Mac.exe 100 PID 2844 wrote to memory of 2096 2844 cmd.exe 101 PID 2844 wrote to memory of 2096 2844 cmd.exe 101 PID 2096 wrote to memory of 2528 2096 cmd.exe 102 PID 2096 wrote to memory of 2528 2096 cmd.exe 102 PID 2096 wrote to memory of 4412 2096 cmd.exe 103 PID 2096 wrote to memory of 4412 2096 cmd.exe 103 PID 2844 wrote to memory of 4804 2844 cmd.exe 104 PID 2844 wrote to memory of 4804 2844 cmd.exe 104 PID 2844 wrote to memory of 3348 2844 cmd.exe 105 PID 2844 wrote to memory of 3348 2844 cmd.exe 105 PID 2844 wrote to memory of 2068 2844 cmd.exe 106 PID 2844 wrote to memory of 2068 2844 cmd.exe 106 PID 2844 wrote to memory of 548 2844 cmd.exe 107 PID 2844 wrote to memory of 548 2844 cmd.exe 107 PID 2844 wrote to memory of 3232 2844 cmd.exe 108 PID 2844 wrote to memory of 3232 2844 cmd.exe 108 PID 3232 wrote to memory of 3064 3232 cmd.exe 109 PID 3232 wrote to memory of 3064 3232 cmd.exe 109 PID 3232 wrote to memory of 648 3232 cmd.exe 110 PID 3232 wrote to memory of 648 3232 cmd.exe 110 PID 2844 wrote to memory of 3200 2844 cmd.exe 111 PID 2844 wrote to memory of 3200 2844 cmd.exe 111 PID 2844 wrote to memory of 4332 2844 cmd.exe 112 PID 2844 wrote to memory of 4332 2844 cmd.exe 112 PID 2844 wrote to memory of 4000 2844 cmd.exe 113 PID 2844 wrote to memory of 4000 2844 cmd.exe 113 PID 2844 wrote to memory of 4012 2844 cmd.exe 114 PID 2844 wrote to memory of 4012 2844 cmd.exe 114 PID 2844 wrote to memory of 5076 2844 cmd.exe 115 PID 2844 wrote to memory of 5076 2844 cmd.exe 115 PID 5076 wrote to memory of 3340 5076 cmd.exe 116 PID 5076 wrote to memory of 3340 5076 cmd.exe 116 PID 2844 wrote to memory of 3016 2844 cmd.exe 117 PID 2844 wrote to memory of 3016 2844 cmd.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mac.exe"C:\Users\Admin\AppData\Local\Temp\Mac.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Mac.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Mac.exe" MD53⤵PID:3820
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2316
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2524
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\MAC.bat >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]3⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\System32\Wbem\WMIC.exewmic nic where physicaladapter=true get deviceid4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\system32\findstr.exefindstr [0-9]4⤵PID:4412
-
-
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\013⤵PID:4804
-
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0013⤵PID:3348
-
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\00013⤵PID:2068
-
-
C:\Windows\system32\reg.exeREG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0001 /v NetworkAddress /t REG_SZ /d F65203709E46 /f3⤵PID:548
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]3⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\System32\Wbem\WMIC.exewmic nic where physicaladapter=true get deviceid4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\system32\findstr.exefindstr [0-9]4⤵PID:648
-
-
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\013⤵PID:3200
-
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0013⤵PID:4332
-
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\00013⤵PID:4000
-
-
C:\Windows\system32\reg.exeREG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0001 /v PnPCapabilities /t REG_DWORD /d 24 /f3⤵PID:4012
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic nic where (netconnectionid like '%') get netconnectionid,netconnectionstatus /format:csv"3⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\System32\Wbem\WMIC.exewmic nic where (netconnectionid like '%') get netconnectionid,netconnectionstatus /format:csv4⤵PID:3340
-
-
-
C:\Windows\system32\netsh.exenetsh interface set interface name="Ethernet" disable3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3016
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3976
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵
- Modifies data under HKEY_USERS
PID:4304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c59b3336cbfcdadf5caa920eee90b780
SHA1d0b413147d681fa116d3185224f63977933ffd60
SHA256c47cf7d4c20c531aae1ba88eb5ac9462820e5e6483a4b574a59d600bbd09c379
SHA5120cc84604a8a01289e2abf86e2b6afa0cf011f12122a15312ac5dc17ab1f1287f6d954e71bc646a336a7666de594373efd71d1ab2288e98bbc392699e9f03d6cc