Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 03:17
Static task
static1
Behavioral task
behavioral1
Sample
513b2ceca89e0b01411f79b83dfdf5a0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
513b2ceca89e0b01411f79b83dfdf5a0N.exe
Resource
win10v2004-20240709-en
General
-
Target
513b2ceca89e0b01411f79b83dfdf5a0N.exe
-
Size
499KB
-
MD5
513b2ceca89e0b01411f79b83dfdf5a0
-
SHA1
e8263150095a5b13e95445d494fcfd60cd1f85d1
-
SHA256
f67f8fe109fdbb664c5f50721120625ab1e34788afc2dd537cff88ed150f05ed
-
SHA512
8fc20d06f494dfc87615c711a840fe5c912e1c0133d8cdb4659380a2d20cdff1a30c0e9e425723fbc1c56fe0792268e468b6523382ee13f26ecc98077d3697a2
-
SSDEEP
12288:pcuA7U+EljXJBh+tli2vklUHM13sfoBjW40:pcuA7U+85BCl/cSHMlsujR0
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 513b2ceca89e0b01411f79b83dfdf5a0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2240 s9507.exe -
Loads dropped DLL 4 IoCs
pid Process 2416 513b2ceca89e0b01411f79b83dfdf5a0N.exe 2416 513b2ceca89e0b01411f79b83dfdf5a0N.exe 2416 513b2ceca89e0b01411f79b83dfdf5a0N.exe 2416 513b2ceca89e0b01411f79b83dfdf5a0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 513b2ceca89e0b01411f79b83dfdf5a0N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 513b2ceca89e0b01411f79b83dfdf5a0N.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2416 513b2ceca89e0b01411f79b83dfdf5a0N.exe 2416 513b2ceca89e0b01411f79b83dfdf5a0N.exe 2240 s9507.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2240 s9507.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2240 s9507.exe 2240 s9507.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2240 2416 513b2ceca89e0b01411f79b83dfdf5a0N.exe 31 PID 2416 wrote to memory of 2240 2416 513b2ceca89e0b01411f79b83dfdf5a0N.exe 31 PID 2416 wrote to memory of 2240 2416 513b2ceca89e0b01411f79b83dfdf5a0N.exe 31 PID 2416 wrote to memory of 2240 2416 513b2ceca89e0b01411f79b83dfdf5a0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\513b2ceca89e0b01411f79b83dfdf5a0N.exe"C:\Users\Admin\AppData\Local\Temp\513b2ceca89e0b01411f79b83dfdf5a0N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\n9507\s9507.exe"C:\Users\Admin\AppData\Local\Temp\n9507\s9507.exe" ins.exe /e12347706 /u5193805b-c284-4f85-b972-26465bc06f2f /v"C:\Users\Admin\AppData\Local\Temp\513b2ceca89e0b01411f79b83dfdf5a0N.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275KB
MD5316287c0010874356127dd8b7bc17896
SHA10939ad854954393f052f5ba64b6c4b8e03a8866b
SHA25669d0557e8d695a1d44ed91b643b93a01a2fd74056dc21bf334965f5045e8f4c9
SHA5121d995b5e18bdf387a42d0029d20c1f2889fa70c5bc8895df674fc83e3b49bb2acd8031966b593cff2b72438bde929a50a7558adc1df5d8cae7097b8fedb39c1c