Analysis
-
max time kernel
20s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
b957a00c8b360f5ab052318b745d8480N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b957a00c8b360f5ab052318b745d8480N.exe
Resource
win10v2004-20240709-en
General
-
Target
b957a00c8b360f5ab052318b745d8480N.exe
-
Size
494KB
-
MD5
b957a00c8b360f5ab052318b745d8480
-
SHA1
c25ceb219dfdda37c7785f6ee1f3f8fa3327ec81
-
SHA256
87494e8a2ae9b8f6a3a754cc97b2d2dfeccd664ce5e90eaa45c2d515db94f1e3
-
SHA512
bef0eeca1f1317e42e297897b7e0b4263f9623bde6e45a544861ef6ebe5a8b554aa580433ebe30704385356fea4c38a30852566545a4857a8f114c8c32230636
-
SSDEEP
12288:Q3ma4bE/SPQHqkdTvL7Ff456p9HKuJC71:Q3b4bEiFCVMaX41
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b957a00c8b360f5ab052318b745d8480N.exe -
Executes dropped EXE 1 IoCs
pid Process 1152 s473.exe -
Loads dropped DLL 4 IoCs
pid Process 2556 b957a00c8b360f5ab052318b745d8480N.exe 2556 b957a00c8b360f5ab052318b745d8480N.exe 2556 b957a00c8b360f5ab052318b745d8480N.exe 2556 b957a00c8b360f5ab052318b745d8480N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer b957a00c8b360f5ab052318b745d8480N.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS b957a00c8b360f5ab052318b745d8480N.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2556 b957a00c8b360f5ab052318b745d8480N.exe 2556 b957a00c8b360f5ab052318b745d8480N.exe 1152 s473.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1152 s473.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1152 s473.exe 1152 s473.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2556 wrote to memory of 1152 2556 b957a00c8b360f5ab052318b745d8480N.exe 29 PID 2556 wrote to memory of 1152 2556 b957a00c8b360f5ab052318b745d8480N.exe 29 PID 2556 wrote to memory of 1152 2556 b957a00c8b360f5ab052318b745d8480N.exe 29 PID 2556 wrote to memory of 1152 2556 b957a00c8b360f5ab052318b745d8480N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b957a00c8b360f5ab052318b745d8480N.exe"C:\Users\Admin\AppData\Local\Temp\b957a00c8b360f5ab052318b745d8480N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\n473\s473.exe"C:\Users\Admin\AppData\Local\Temp\n473\s473.exe" ins.exe /e 11789745 /u 4dc90cd0-7328-42b2-8f65-20295bc06f26 /v "C:\Users\Admin\AppData\Local\Temp\b957a00c8b360f5ab052318b745d8480N.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD59e24fe7dce5a39ec33319909e3e2e9de
SHA1492d86466cd12c98803a262672cb5171f341e8d1
SHA25605cdd536227ac4ebab76770ed3b2bbc364deb8cfdc1f6a6f598ecb86aa3d268f
SHA512155b353506ef81cf0149178f8dc4b75575dbd0a2d2912038dac1278d8db454fb80edfd84958ebfeb6a3ef9c5de19af1284224bf7bb4af7113c863c3b1be1f4e1