Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 03:57
Static task
static1
Behavioral task
behavioral1
Sample
8d2c3399e54a887cdd06daef2befca50N.exe
Resource
win7-20240705-en
General
-
Target
8d2c3399e54a887cdd06daef2befca50N.exe
-
Size
498KB
-
MD5
8d2c3399e54a887cdd06daef2befca50
-
SHA1
f010ced914b6582089c094f6f451d2908776bea2
-
SHA256
6ee1623c76030589e8b3080314913aee8c2596227d8874abf469527ad3ae5fc3
-
SHA512
19c3c767c6912b8e8e75ee48b09d6725af64aa03235b4dc596fbd8f8d178c57efbe168833075a54e89ac3bcb587b875dfb8fccc0021fc8e11ed5e1c2c932869e
-
SSDEEP
6144:3n4bly8sbRD3AHcRkpOrA0vWmJ/N0zmIMc+UftOyPoFjdz5C49PS3DRXQ20efxuO:3nYgBND3AHc2pn0vW46jBFOujjxuJCmM
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8d2c3399e54a887cdd06daef2befca50N.exe -
Executes dropped EXE 1 IoCs
pid Process 2780 s4188.exe -
Loads dropped DLL 4 IoCs
pid Process 2692 8d2c3399e54a887cdd06daef2befca50N.exe 2692 8d2c3399e54a887cdd06daef2befca50N.exe 2692 8d2c3399e54a887cdd06daef2befca50N.exe 2692 8d2c3399e54a887cdd06daef2befca50N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d2c3399e54a887cdd06daef2befca50N.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 8d2c3399e54a887cdd06daef2befca50N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 8d2c3399e54a887cdd06daef2befca50N.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2692 8d2c3399e54a887cdd06daef2befca50N.exe 2692 8d2c3399e54a887cdd06daef2befca50N.exe 2780 s4188.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2780 s4188.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2780 s4188.exe 2780 s4188.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2780 2692 8d2c3399e54a887cdd06daef2befca50N.exe 30 PID 2692 wrote to memory of 2780 2692 8d2c3399e54a887cdd06daef2befca50N.exe 30 PID 2692 wrote to memory of 2780 2692 8d2c3399e54a887cdd06daef2befca50N.exe 30 PID 2692 wrote to memory of 2780 2692 8d2c3399e54a887cdd06daef2befca50N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d2c3399e54a887cdd06daef2befca50N.exe"C:\Users\Admin\AppData\Local\Temp\8d2c3399e54a887cdd06daef2befca50N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\n4188\s4188.exe"C:\Users\Admin\AppData\Local\Temp\n4188\s4188.exe" ins.exe /e 12719512 /u 533ebb6c-9db8-444a-b409-6bf50a000013 /v "C:\Users\Admin\AppData\Local\Temp\8d2c3399e54a887cdd06daef2befca50N.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD529c1470cbf58838dc6a3f9d624b4527f
SHA1e8d1d1306e44b47e36b03ade24deb56e98bb82d4
SHA256dd056f949a90c1de581ddb0b16c5d49309cfe99926cd397fc31cff7e4895141d
SHA5129e90bcd2f0ff30b035531c1fd885034f6e6763d4e566bf0a0ee5b8238fdfc62d581c6c3f4e97cf36f374e1b8597fe0b39544bb30c9b7d8802cef98cc4880bd57