Analysis

  • max time kernel
    20s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 13:39

General

  • Target

    b957a00c8b360f5ab052318b745d8480N.exe

  • Size

    494KB

  • MD5

    b957a00c8b360f5ab052318b745d8480

  • SHA1

    c25ceb219dfdda37c7785f6ee1f3f8fa3327ec81

  • SHA256

    87494e8a2ae9b8f6a3a754cc97b2d2dfeccd664ce5e90eaa45c2d515db94f1e3

  • SHA512

    bef0eeca1f1317e42e297897b7e0b4263f9623bde6e45a544861ef6ebe5a8b554aa580433ebe30704385356fea4c38a30852566545a4857a8f114c8c32230636

  • SSDEEP

    12288:Q3ma4bE/SPQHqkdTvL7Ff456p9HKuJC71:Q3b4bEiFCVMaX41

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b957a00c8b360f5ab052318b745d8480N.exe
    "C:\Users\Admin\AppData\Local\Temp\b957a00c8b360f5ab052318b745d8480N.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Loads dropped DLL
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Users\Admin\AppData\Local\Temp\n473\s473.exe
      "C:\Users\Admin\AppData\Local\Temp\n473\s473.exe" ins.exe /e 11789745 /u 4dc90cd0-7328-42b2-8f65-20295bc06f26 /v "C:\Users\Admin\AppData\Local\Temp\b957a00c8b360f5ab052318b745d8480N.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\n473\s473.exe

    Filesize

    284KB

    MD5

    9e24fe7dce5a39ec33319909e3e2e9de

    SHA1

    492d86466cd12c98803a262672cb5171f341e8d1

    SHA256

    05cdd536227ac4ebab76770ed3b2bbc364deb8cfdc1f6a6f598ecb86aa3d268f

    SHA512

    155b353506ef81cf0149178f8dc4b75575dbd0a2d2912038dac1278d8db454fb80edfd84958ebfeb6a3ef9c5de19af1284224bf7bb4af7113c863c3b1be1f4e1

  • memory/1152-14-0x000007FEF5E7E000-0x000007FEF5E7F000-memory.dmp

    Filesize

    4KB

  • memory/1152-15-0x0000000001FC0000-0x0000000001FCA000-memory.dmp

    Filesize

    40KB

  • memory/1152-16-0x000007FEF5BC0000-0x000007FEF655D000-memory.dmp

    Filesize

    9.6MB

  • memory/1152-17-0x000007FEF5BC0000-0x000007FEF655D000-memory.dmp

    Filesize

    9.6MB

  • memory/1152-18-0x000007FEF5BC0000-0x000007FEF655D000-memory.dmp

    Filesize

    9.6MB

  • memory/1152-19-0x000007FEF5BC0000-0x000007FEF655D000-memory.dmp

    Filesize

    9.6MB