Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 03:22
Behavioral task
behavioral1
Sample
UniversalNoRecoil.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
UniversalNoRecoil.exe
Resource
win10v2004-20240709-en
General
-
Target
UniversalNoRecoil.exe
-
Size
3.5MB
-
MD5
09bc1e644be731132ca33f86ef2aa866
-
SHA1
910616c61bc4b47b52840d12acad335a7296a501
-
SHA256
402c0ab258264cc9759adc7c34627bef4c44427e0bd76eb75a0bdb577d01e40d
-
SHA512
6a25c0e413c97b605c7081f9eef45f934067f708d7d38ea50d3c6c4cf2b33f5043558d871c509b3185860d3c06989454e0f5521e740d6700fdee91cf808cbfda
-
SSDEEP
49152:8XzhpDtKSK1cb8PGK+Tfuqmpc3elWo8GnQAsYZEVffBcdelkuR7X39c3CnD:8XzhW148Pd+Tf1mpcOldJQ3/VffBGlA
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ icsys.icn.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ UniversalNoRecoil.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion UniversalNoRecoil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion UniversalNoRecoil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe -
Executes dropped EXE 6 IoCs
pid Process 5064 universalnorecoil.exe 2428 icsys.icn.exe 1412 explorer.exe 4280 spoolsv.exe 468 svchost.exe 1840 spoolsv.exe -
resource yara_rule behavioral2/memory/3600-0-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/files/0x00080000000234e1-12.dat themida behavioral2/memory/2428-13-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/files/0x00080000000234e3-19.dat themida behavioral2/memory/1412-22-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/files/0x00080000000234e5-29.dat themida behavioral2/memory/4280-31-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/files/0x00080000000234e7-39.dat themida behavioral2/memory/468-40-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/1840-45-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/3600-56-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/2428-55-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/4280-51-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/1840-52-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/1412-57-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/468-58-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/1412-70-0x0000000000400000-0x0000000000A16000-memory.dmp themida -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA UniversalNoRecoil.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icsys.icn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 3600 UniversalNoRecoil.exe 2428 icsys.icn.exe 1412 explorer.exe 4280 spoolsv.exe 468 svchost.exe 1840 spoolsv.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe UniversalNoRecoil.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 2428 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 5064 universalnorecoil.exe 1412 explorer.exe 468 svchost.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 3600 UniversalNoRecoil.exe 3600 UniversalNoRecoil.exe 5064 universalnorecoil.exe 5064 universalnorecoil.exe 2428 icsys.icn.exe 2428 icsys.icn.exe 1412 explorer.exe 1412 explorer.exe 4280 spoolsv.exe 4280 spoolsv.exe 468 svchost.exe 468 svchost.exe 1840 spoolsv.exe 1840 spoolsv.exe 5064 universalnorecoil.exe 5064 universalnorecoil.exe 5064 universalnorecoil.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3600 wrote to memory of 5064 3600 UniversalNoRecoil.exe 87 PID 3600 wrote to memory of 5064 3600 UniversalNoRecoil.exe 87 PID 3600 wrote to memory of 2428 3600 UniversalNoRecoil.exe 88 PID 3600 wrote to memory of 2428 3600 UniversalNoRecoil.exe 88 PID 3600 wrote to memory of 2428 3600 UniversalNoRecoil.exe 88 PID 2428 wrote to memory of 1412 2428 icsys.icn.exe 90 PID 2428 wrote to memory of 1412 2428 icsys.icn.exe 90 PID 2428 wrote to memory of 1412 2428 icsys.icn.exe 90 PID 1412 wrote to memory of 4280 1412 explorer.exe 91 PID 1412 wrote to memory of 4280 1412 explorer.exe 91 PID 1412 wrote to memory of 4280 1412 explorer.exe 91 PID 4280 wrote to memory of 468 4280 spoolsv.exe 92 PID 4280 wrote to memory of 468 4280 spoolsv.exe 92 PID 4280 wrote to memory of 468 4280 spoolsv.exe 92 PID 468 wrote to memory of 1840 468 svchost.exe 94 PID 468 wrote to memory of 1840 468 svchost.exe 94 PID 468 wrote to memory of 1840 468 svchost.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\UniversalNoRecoil.exe"C:\Users\Admin\AppData\Local\Temp\UniversalNoRecoil.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3600 -
\??\c:\users\admin\appdata\local\temp\universalnorecoil.exec:\users\admin\appdata\local\temp\universalnorecoil.exe2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5064
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1412 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4280 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:468 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1840
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
904KB
MD573ba1b093985d6b09ff3107b9f635630
SHA1a8528462159913b96bbb1e870f0a738f363f2fb9
SHA256c6874a0e7add4cc916b6dbe67326898f48ccd6cfc3f47eb15cd7545b409b7ef4
SHA5129391130aff46a4fcfccb17d9bcfb220d4cab55958e66008d8d4691ce3aa3d13e963cfe8485a2400d915052da31233b84e02f1d547965a626f326a6c533624fd5
-
Filesize
2.6MB
MD54108c664df6172f02d9afd5f7eafccf5
SHA11bd7b12e4f39d89e79254de2fe138ca76fb4cde4
SHA25658be7352b8be71ce006022a39ef775a93e0b1e93d7fcc75ae028400f43df1d9f
SHA51231d0d67cc6440e94b0de17a0c317a6e625886e560e19d30af050624be59b9b007830a707bb9d79c31910bac53e52595a851b0eb3e27cb08871f90d52c40d52f7
-
Filesize
2.6MB
MD50e4a7348e7f8e650078b9ba71b41cb1f
SHA1915a1307afa15b869c126f1ad53ff117adb92a2f
SHA256b6b91aaae7444b22a1d25744fcb441069fc18e9be3675f4953429650bd5acd33
SHA51203c634b9c97525b3918748bfafc8be126abddd27f3810eef93c94e8b1f569d3164559b2ecd0d35e2c3c26271863a5be30aae1cf82e60a3a53a46da4f7718df60
-
Filesize
2.6MB
MD55ef304451541e0f70d18f63abed4f576
SHA17149df1a5b99cd3952dbdbdde0f1175444375ee5
SHA2567595ab0bce054c5a9e2f445839f3267a60466745d23f25769177fa64a0d4e731
SHA51233ae7cb4a443ec0b18378f380be4f9d3aa8602c1f296af12bda3dcdaa4023739c8da8401f76c9e16c4da720fe6b019473cc9ae820f0b7b1b6a73aec945de64a3
-
Filesize
2.6MB
MD5da3654bbee0ebb961012f8d0e3b91736
SHA135bdc6558fa5ab229a1d16b084415051e8db2f3c
SHA2566daa5d138e5241b0e0da54e3ca71a71d3177c788e5ae33efbc7b72901a6b2476
SHA512cfb0dfc3a26dca9c4986c8f68d2cc101dbdbac6549e1c77bdd34490d32a6036ba232e1fb073c59b0e1d3489324f42f63c54440d6f345a5611ce46c89df88920b