Analysis
-
max time kernel
48s -
max time network
49s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-07-2024 13:20
Behavioral task
behavioral1
Sample
X_protected.exe
Resource
win10-20240404-en
General
-
Target
X_protected.exe
-
Size
7.5MB
-
MD5
40daf12b1ddad422314d75caffbf8e63
-
SHA1
93559caf20d42d455ad31dfb83da22ce26abbe9d
-
SHA256
48f0dc575984fcbd4f0ae9a3f434d8fd6163b6f470bef7b8cd23b9dad858c211
-
SHA512
782f5f3edcba370f1fee58e34aba033eb60b164c907cac4d4b69f9a542061f16ad9297c44834c76914a25418c01d603472494db83888821a0c02076c07ff22c1
-
SSDEEP
196608:U+8zOaubUiLpwYETSEzYeGh07NWsS68mp5KZzgsY:U+Ue4iLGYETlzYBh0RS68iKZc
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ X_protected.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4276 powershell.exe 3000 powershell.exe 660 powershell.exe 2592 powershell.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion X_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion X_protected.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\St.lnk X_protected.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\St.lnk X_protected.exe -
resource yara_rule behavioral1/memory/524-11-0x0000000000400000-0x0000000001650000-memory.dmp themida behavioral1/memory/524-12-0x0000000000400000-0x0000000001650000-memory.dmp themida behavioral1/memory/524-990-0x0000000000400000-0x0000000001650000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\St = "C:\\Users\\Admin\\AppData\\Local\\Temp\\St.exe" X_protected.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA X_protected.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 524 X_protected.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3272 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 164 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 524 X_protected.exe 524 X_protected.exe 3000 powershell.exe 3000 powershell.exe 3000 powershell.exe 660 powershell.exe 660 powershell.exe 660 powershell.exe 2592 powershell.exe 2592 powershell.exe 2592 powershell.exe 4276 powershell.exe 4276 powershell.exe 4276 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 524 X_protected.exe Token: SeDebugPrivilege 3000 powershell.exe Token: SeDebugPrivilege 660 powershell.exe Token: SeDebugPrivilege 2592 powershell.exe Token: SeDebugPrivilege 4276 powershell.exe Token: SeDebugPrivilege 524 X_protected.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 524 wrote to memory of 3000 524 X_protected.exe 73 PID 524 wrote to memory of 3000 524 X_protected.exe 73 PID 524 wrote to memory of 3000 524 X_protected.exe 73 PID 524 wrote to memory of 660 524 X_protected.exe 75 PID 524 wrote to memory of 660 524 X_protected.exe 75 PID 524 wrote to memory of 660 524 X_protected.exe 75 PID 524 wrote to memory of 2592 524 X_protected.exe 77 PID 524 wrote to memory of 2592 524 X_protected.exe 77 PID 524 wrote to memory of 2592 524 X_protected.exe 77 PID 524 wrote to memory of 4276 524 X_protected.exe 79 PID 524 wrote to memory of 4276 524 X_protected.exe 79 PID 524 wrote to memory of 4276 524 X_protected.exe 79 PID 524 wrote to memory of 164 524 X_protected.exe 81 PID 524 wrote to memory of 164 524 X_protected.exe 81 PID 524 wrote to memory of 164 524 X_protected.exe 81 PID 524 wrote to memory of 4604 524 X_protected.exe 86 PID 524 wrote to memory of 4604 524 X_protected.exe 86 PID 524 wrote to memory of 4604 524 X_protected.exe 86 PID 524 wrote to memory of 3252 524 X_protected.exe 88 PID 524 wrote to memory of 3252 524 X_protected.exe 88 PID 524 wrote to memory of 3252 524 X_protected.exe 88 PID 3252 wrote to memory of 3272 3252 cmd.exe 90 PID 3252 wrote to memory of 3272 3252 cmd.exe 90 PID 3252 wrote to memory of 3272 3252 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\X_protected.exe"C:\Users\Admin\AppData\Local\Temp\X_protected.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\X_protected.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'X_protected.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:660
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\St.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'St.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "St" /tr "C:\Users\Admin\AppData\Local\Temp\St.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:164
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /f /tn "St"2⤵PID:4604
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp24AA.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3272
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD5c0bc2aff72c6e75ceb69ce83937af8e1
SHA1cdccacfbf2c9a9eae991eea263bd32529a95fe76
SHA2567d5f86b07492d6e4af60909e142c22589128dcf3e48076633055e112f04914f8
SHA512ba48b01da9dae9c238a76c2ae02ba28d29d0782fbd01ca48d9f21f8b380407b94bebca2c257628491209e760ddf89a59595277677fdd7736b446b6b0f179816e
-
Filesize
18KB
MD522799d02f984b422dd8f80cca46672ac
SHA1350eb85eb590df1f1304cf479d3b1f879501ec2c
SHA256b1372871a26f13edb708a07c1816353f2d5f84bf36d4e636eeabf70630570230
SHA5123889ee94502ae2425ed9ae48ae3ef523ffce92102bdc35b5e56b6ac5103d14658b52dfd1e97364eaf478d68a832cdf6f6e3625831bc103f692baa337f7d62234
-
Filesize
18KB
MD58abd048e4518821e4c533beb519a01d2
SHA1a0862a6d936529d4f1d64281fabaa8c0f51558cf
SHA256a33c123bc837c79d6fbd22b21353e70ac4130537eaac3aee24c069ca90f4c051
SHA5121b36809ebe1b5437960000151b02cbe30827154436be6fdf6c0dfa1e5e06d757706d739df0cc6088e84ba2dadcb28957903bb2583c6cee8a4827c2da0aa64e30
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
163B
MD543b49f325eee40b4d09b83b571acc8e3
SHA1c513bcd371a8a78fd396bca58cf49907e2df0f56
SHA256498047ffe2a9956b0c79bf51a12643ec5ba679c4fc66164751af2e6ca5eeac57
SHA512a0f10f461dc8e21f3f882f66cf06c5465cf84b1955a6aca5a4a13a59774caeefca1a811b9978f4f9ca48d9427ddb23311911775ba95efa242a963badabca9432