Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 10:43
Behavioral task
behavioral1
Sample
MWIII (4).exe
Resource
win7-20240708-en
windows7-x64
7 signatures
150 seconds
General
-
Target
MWIII (4).exe
-
Size
5.6MB
-
MD5
b476586a746d1c9f0571b23d6e0f8eb0
-
SHA1
f9ecd837efba745d191f2f5e2f6961b3c2312d7a
-
SHA256
f97a31c132cf5472952069dbbd483f80d2e6ce2f22f0808cfe9e2fc1de191e9c
-
SHA512
8b3914081b897fbf9bcc913322e1083bac4c8620f54cb0e6710e6b058af2b6ceea3e4cf8533a534c757506d5ae1ab66d161f25b34abe37e5f4c01fb5c701ea1a
-
SSDEEP
98304:RXXO/G3+KDPHMNelEWoZqclpBq1JBKatE+vLcSPGkmBmdFmJQrers8+ui:dOe3hHUMEWoQef+KuE+zcOGkmBQFFB8y
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MWIII (4).exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MWIII (4).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MWIII (4).exe -
resource yara_rule behavioral1/memory/2444-0-0x0000000140000000-0x0000000140E2B000-memory.dmp themida behavioral1/memory/2444-2-0x0000000140000000-0x0000000140E2B000-memory.dmp themida behavioral1/memory/2444-3-0x0000000140000000-0x0000000140E2B000-memory.dmp themida behavioral1/memory/2444-4-0x0000000140000000-0x0000000140E2B000-memory.dmp themida behavioral1/memory/2444-6-0x0000000140000000-0x0000000140E2B000-memory.dmp themida behavioral1/memory/2444-15-0x0000000140000000-0x0000000140E2B000-memory.dmp themida behavioral1/memory/2444-19-0x0000000140000000-0x0000000140E2B000-memory.dmp themida behavioral1/memory/2444-22-0x0000000140000000-0x0000000140E2B000-memory.dmp themida behavioral1/memory/2444-23-0x0000000140000000-0x0000000140E2B000-memory.dmp themida behavioral1/memory/2444-24-0x0000000140000000-0x0000000140E2B000-memory.dmp themida behavioral1/memory/2444-25-0x0000000140000000-0x0000000140E2B000-memory.dmp themida behavioral1/memory/2444-26-0x0000000140000000-0x0000000140E2B000-memory.dmp themida behavioral1/memory/2444-27-0x0000000140000000-0x0000000140E2B000-memory.dmp themida behavioral1/memory/2444-28-0x0000000140000000-0x0000000140E2B000-memory.dmp themida behavioral1/memory/2444-29-0x0000000140000000-0x0000000140E2B000-memory.dmp themida behavioral1/memory/2444-30-0x0000000140000000-0x0000000140E2B000-memory.dmp themida behavioral1/memory/2444-31-0x0000000140000000-0x0000000140E2B000-memory.dmp themida behavioral1/memory/2444-32-0x0000000140000000-0x0000000140E2B000-memory.dmp themida behavioral1/memory/2444-33-0x0000000140000000-0x0000000140E2B000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MWIII (4).exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2444 MWIII (4).exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe 2444 MWIII (4).exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2088 2444 MWIII (4).exe 31 PID 2444 wrote to memory of 2088 2444 MWIII (4).exe 31 PID 2444 wrote to memory of 2088 2444 MWIII (4).exe 31 PID 2088 wrote to memory of 2680 2088 cmd.exe 32 PID 2088 wrote to memory of 2680 2088 cmd.exe 32 PID 2088 wrote to memory of 2680 2088 cmd.exe 32 PID 2088 wrote to memory of 2668 2088 cmd.exe 33 PID 2088 wrote to memory of 2668 2088 cmd.exe 33 PID 2088 wrote to memory of 2668 2088 cmd.exe 33 PID 2088 wrote to memory of 2224 2088 cmd.exe 34 PID 2088 wrote to memory of 2224 2088 cmd.exe 34 PID 2088 wrote to memory of 2224 2088 cmd.exe 34 PID 2444 wrote to memory of 2700 2444 MWIII (4).exe 35 PID 2444 wrote to memory of 2700 2444 MWIII (4).exe 35 PID 2444 wrote to memory of 2700 2444 MWIII (4).exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\MWIII (4).exe"C:\Users\Admin\AppData\Local\Temp\MWIII (4).exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\MWIII (4).exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\MWIII (4).exe" MD53⤵PID:2680
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2668
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2700
-