Analysis

  • max time kernel
    129s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 09:32

General

  • Target

    VirtualBox-7.0.20-163906-Win.exe

  • Size

    105.1MB

  • MD5

    b822835698e76fff193342effc92d286

  • SHA1

    e049adb24caf0153b94e801da9835d485c67e38c

  • SHA256

    fa3544162eee87b660999bd913f76ccb2e5a706928ef2c2e29811e4ac76fb166

  • SHA512

    0381b27478dc25d4b3707fb21a34be66ca42eb18d93ce8ec90be7325015f540a39ebfea58b7992a38cc2c861e6e86d89c67f5b3a84ddb65e339fcca0dc314bed

  • SSDEEP

    3145728:VuwDpzeIGwA7iKVCv8hxxgFYHey3WCfEOiP1e48TetH+H9:VuwDpz9A70Cno1XZBtHC9

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 6 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 18 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 23 IoCs
  • Loads dropped DLL 18 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirtualBox-7.0.20-163906-Win.exe
    "C:\Users\Admin\AppData\Local\Temp\VirtualBox-7.0.20-163906-Win.exe"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2676
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding C7A4B7F812CEA13229C65F63B154512E C
      2⤵
      • Loads dropped DLL
      PID:1996
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 86D98C5ED73324C9F40F8142F50317F3
      2⤵
      • Loads dropped DLL
      PID:824
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding B6DFDFCFDF34A363DCAA59E931332915
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2456
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 8571CFB2172C52C125BB91FC760349D0 M Global\MSI0000
      2⤵
      • Drops file in Drivers directory
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Loads dropped DLL
      • Modifies data under HKEY_USERS
      PID:2468
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:2440
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "000000000000038C" "00000000000004A4"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:1160
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{13dc7f9d-4735-7969-2dad-36069a016769}\VBoxUSB.inf" "9" "66237d90b" "00000000000003E8" "WinSta0\Default" "00000000000004A4" "208" "C:\Program Files\Oracle\VirtualBox\drivers\USB\device"
      1⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{7261c7a7-d727-2bab-f1a8-e001dce67c73} Global\{7f7967d0-2b84-5d19-6c59-4a21bbd3b97c} C:\Windows\System32\DriverStore\Temp\{4b158d57-1826-1807-79cc-af2227b6c528}\VBoxUSB.inf C:\Windows\System32\DriverStore\Temp\{4b158d57-1826-1807-79cc-af2227b6c528}\VBoxUSB.cat
        2⤵
        • Modifies data under HKEY_USERS
        PID:1520

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PROGRA~1\Oracle\VIRTUA~1\drivers\USB\device\VBoxUSB.sys

      Filesize

      184KB

      MD5

      477569c254917d2c3e92108aee4d84b9

      SHA1

      49a8714c3e8fddd31c3725e39272c21b892cd681

      SHA256

      3eaa6ca9447f36c9f6e759244ae0ab64ef070a906809863b1a3d02725dd1c23a

      SHA512

      cd973c0bbca122da1a117c948969849f53788910a3a113317fc9dc6c27d9e79992117a06bd7d01be6e5faf9ce83942326d72ff3ba205ad19a6f2afdc05c25d75

    • C:\Program Files\Oracle\VirtualBox\drivers\USB\device\VBoxUSB.cat

      Filesize

      19KB

      MD5

      efcd24c4e96c670449494be9bab36d04

      SHA1

      e0e6f34d3cbfab8e52508764176a9c37305bf453

      SHA256

      b35a06b5511f3d40765406bcb1de7ed8b9eba89a06a4fcbed983b4c6f6159471

      SHA512

      7fa3be5099f34a76ca7690467101de04007acb0ecbc2a9ca2ddc112280b29fadae80c04b344222e669cdbe50ffeb89e9aa95481bde1d83cdce1dfefad03885fa

    • C:\Program Files\Oracle\VirtualBox\drivers\USB\device\VBoxUSB.inf

      Filesize

      2KB

      MD5

      3155160d6548ce4433d1611ba4872451

      SHA1

      46b7099f85af93155de58e5b4e41e8d48937b68b

      SHA256

      054385912c2f74a171572e750862f2ec75ab93c59f92213b40d007ce9aecc6e6

      SHA512

      3b2d79b8910b939f605f5c8d7a6ece541b80347602b3dc9f066f943a67fe90ec56607d29f2fe3824ab57b5781554171e800ed8ba549e9d535e16831fd368703a

    • C:\Program Files\Oracle\VirtualBox\drivers\USB\filter\VBoxUSBMon.cat

      Filesize

      19KB

      MD5

      f02290e0e12c2a240842faa0d0b4e8bd

      SHA1

      99945af90d9c8273571e67cab5a51a23c46aa482

      SHA256

      7071e601d25284a091c4bf4b44e96073439f02fb18461be622a427fdedbd5235

      SHA512

      eab09ee7de948eeb0c00912b1d0cce4aebc8f4b8ea56804d1eff2a7278a0503bca049f83f3bcefeca740f167cfedf5d3c66c89f1cde76f8fc8976836fd40f115

    • C:\Program Files\Oracle\VirtualBox\drivers\USB\filter\VBoxUSBMon.inf

      Filesize

      3KB

      MD5

      b0a35c2ca1180c2e4963e5be1235d93d

      SHA1

      862d17275c5e82430f37813c107f852af954bbdf

      SHA256

      ba5c69eee5390746fe9cd29a26197853d74d46b4248162c39be8f5212a9bf17d

      SHA512

      a8a842c3c9c10fb2c4d55589b64dd48d60a6bf5f41fd7092a2965d8f3ab7c3b8dc32822217df3f761ea77981395fa847a67bb9944ce9c718b747340db805c6bd

    • C:\Program Files\Oracle\VirtualBox\drivers\USB\filter\VBoxUSBMon.sys

      Filesize

      199KB

      MD5

      d0a8b437866db80fd1661174886f56dd

      SHA1

      2166c3f54262cae094073a2bc3b0c86f349ca51b

      SHA256

      05c99ae7cf556e8e35f22c51f5e52233baf236a6dccbdb15c5611da0e20b805f

      SHA512

      fa3d23e39bc607ca96af92ab4e382233e2194aeec2de95af8196bb72c5304327b590c230da211521a26405ac0e1042c190f344fd34bc0878bd39ad02b255f72d

    • C:\Program Files\Oracle\VirtualBox\drivers\vboxsup\VBoxSup.cat

      Filesize

      19KB

      MD5

      4e6f0c0c56e0f9432113c49ece3dda62

      SHA1

      d038a2cbd8fb3f43618a40c3b4be8c01c0cf3b28

      SHA256

      6d16a05e733476a129cf9e8c1c876671094a1749e67291535a8124d749a0fa94

      SHA512

      fa378b3d17028713a9d29371253b00945707f179629672932e26f0073ee9ca8d51d820860a2cf9628434bab3f79e01f3b1ac6e1f73977bcf39b33aa1848363f0

    • C:\Program Files\Oracle\VirtualBox\drivers\vboxsup\VBoxSup.inf

      Filesize

      3KB

      MD5

      cdff988430eb1bc5b00282cf72940e73

      SHA1

      65ea17e6e88cc4feb17031836b501fbb0f1b1d4e

      SHA256

      4cd64a11a7bdf1f18cc684f3ee6c8eeae8474074bd7fbebd7fe543656bb05b41

      SHA512

      8e01d8ad58f679ead7b35b5128f49f32535afa52a6844e4a53b714f4df538eb372a6345489e2994921557846460ea990407a811976439f69062f176b5f11a11a

    • C:\Program Files\Oracle\VirtualBox\drivers\vboxsup\VBoxSup.sys

      Filesize

      1.0MB

      MD5

      146ccf9c24cd243b27919caeace73f74

      SHA1

      7df3bc16502a2dd2420f5d81e1d8acbe05c8fc7a

      SHA256

      95bf86954288bc187f0b034675a75a9e06ff5dc500c4a317c387c3cf22b5a628

      SHA512

      8e21fcef6456d27acc7811e624791ac8724d8b3345772578910848ce67c6f13855d5c5af3f057eb0f8c5c20aee4923f25ced5fcc1c309d127ff2a0b6a10a5700

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

      Filesize

      471B

      MD5

      4f4adc1c1ca88ff7e8c36d133a8ecda0

      SHA1

      72786dcd1d303cd9470a24e45c49c8be0eca64ed

      SHA256

      df376680485b5fb1b67534fa2d2873d89c6aa73270d1401e2c70eda139cbb13a

      SHA512

      ee5744f70ae12619dd93fb7463036953a29a34eb5584083c816be789a571a2848ed8ac1320410b0bf1ae7aeac9e3527ca8a27ff314adb1cfa59c6a9cad339024

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_D2F6556190F7B1A25A117FFB5467EEBD

      Filesize

      727B

      MD5

      e7933d7a74b9b710bca5c26102752b74

      SHA1

      69c0a4d2265ecfe761984194e2171d40583e5648

      SHA256

      ecad033a416f6870c9fdabeae0e0fd7eca1ed723459ec87731e856b4e2746711

      SHA512

      bcdcf941d23c4ae822203123b9c5199a6991c79f4e2ca95e780573b0471b30af85084dc5094367195bf29d3483543236aa24147b9b7270732065d4e72086eb7b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

      Filesize

      727B

      MD5

      16aca8f094a2ff8d3583c5ffa6794c13

      SHA1

      ddc31408896006459d03b4ca884c16f1b5ea75c1

      SHA256

      18bcf914006e1367c2f1dfe94b5bcc497a0c731f95a546c8a7742df4cf4a99ff

      SHA512

      42b0f7d4d8e7f2dd54f26945467a73c1bb02a1dbdd6b975d389fc96a263e7c944ca443baca215fd6a1bb1d2b81d3cff8295cdd9bd5050291303a4ed2dff09a75

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

      Filesize

      400B

      MD5

      a9b5dcb72d953fc46c38674109d941e2

      SHA1

      766cab76bb8c6441e12d43868f4fef0216f7f084

      SHA256

      06e1dbbc6db647a590322d8108218a56dea065dd1c8d2bc7a6e8883f65e7d1eb

      SHA512

      0d6186db8ab2ab21d0b6159c6629edf37fc2c64774ba5648da74dd38a9ec5b4b5722034766f4c47a8afa7fbb0d1eb4994f574d76586aa65bbe87567d06507c4a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_D2F6556190F7B1A25A117FFB5467EEBD

      Filesize

      412B

      MD5

      a36ddda7d7f015f780241b89bc853c11

      SHA1

      11596e3c8257e8951f4fbcf0882ca9e78225da5d

      SHA256

      840c369502c6d4bc4a5b2d3403f51ad6da0a97930200d619cbf304d61abe7392

      SHA512

      006086ac90fe53bc6a15048e7783eee98bc1414dc022b4a9bc807b6830eaa732a0badff34c51e27e279bfc7cf6b44963b6e7c09aefc33fa964fecc90703a0e6d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      67d1a60d018966305605ca2e1a3a2773

      SHA1

      ec1a0a8eb41bf9b8e0e5f6aa5827840dcb1e9c19

      SHA256

      f5760a136c3bfe7900e9ec8743d787226c694d3e738736d0b927aaec1834e16a

      SHA512

      bd5e7e86d30a8d07000e0328b01203b1d438e808b7a37b3d82327d37419ff85fc6fae33678245b7831b81b47d5e6dc8b1592072c73fe234b730eb0192dafb068

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

      Filesize

      412B

      MD5

      41870d5c1dd8cbdffd336ec2251fa25a

      SHA1

      fca7b3aa4435e3136ee63d792e5cd3f0ff7047a2

      SHA256

      ddb4d4bd84b582f768868a9cd6b73f4f7d4f259664ea9b413b9226386e67ffc8

      SHA512

      9bfa4778006887306ebe494490742cee8645f1e909ee111a4603fbd1c8f4ae7c19f5b49bc947e459734f6368937170d6ecadbc1a38b4d9a7c5a43e0b089255ab

    • C:\Users\Admin\AppData\Local\Temp\Cab4FD7.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\CabB740.tmp

      Filesize

      29KB

      MD5

      d59a6b36c5a94916241a3ead50222b6f

      SHA1

      e274e9486d318c383bc4b9812844ba56f0cff3c6

      SHA256

      a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

      SHA512

      17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

    • C:\Users\Admin\AppData\Local\Temp\MSI52CA.tmp

      Filesize

      324KB

      MD5

      0653ce43996240dde250d557ef940bed

      SHA1

      da125564fadda9bea308bd7325d4664ee14c69a8

      SHA256

      d2fd21376c4595e60299e37cb55dceb92b531685f1a4545c6bb73681dbcad193

      SHA512

      27ab2bd553fa390315d360e593ca95e90f8de13d0d60326549fd5e63479143b33a0a7a49c4111e2041cfb05d5f2e9b516eaa7261acae3884094e3842a8309a6c

    • C:\Users\Admin\AppData\Local\Temp\Tar5009.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\TarB743.tmp

      Filesize

      81KB

      MD5

      b13f51572f55a2d31ed9f266d581e9ea

      SHA1

      7eef3111b878e159e520f34410ad87adecf0ca92

      SHA256

      725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

      SHA512

      f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

    • C:\Windows\Installer\MSI91BB.tmp

      Filesize

      234KB

      MD5

      8edc1557e9fc7f25f89ad384d01bcec4

      SHA1

      98e64d7f92b8254fe3f258e3238b9e0f033b5a9c

      SHA256

      78860e15e474cc2af7ad6e499a8971b6b8197afb8e49a1b9eaaa392e4378f3a5

      SHA512

      d26c9dce3c3d17583ffb5dbcd3989f93b096a7f64a37a2701a474c1bf4b8c8b1e922c352d33f24e411f1c793e1b4af11a3aec1de489087d481b1b636df2050cd

    • C:\Windows\Installer\MSI95F2.tmp

      Filesize

      149KB

      MD5

      418322f7be2b68e88a93a048ac75a757

      SHA1

      09739792ff1c30f73dacafbe503630615922b561

      SHA256

      ea5d4b4c7e7be1ce24a614ae1e31a58bcae6f1694dd8bfb735cf47d35a08d59b

      SHA512

      253f62f5ce75df3e9ac3c62e2f06f30c7c6de6280fbfc830cdd15bf29cb8ee9ed878212f6df5d0ac6a5c9be0e6259f900eccee472a890f15dd3ff1f84958aeef

    • C:\Windows\Installer\MSIB680.tmp

      Filesize

      690KB

      MD5

      8deb7d2f91c7392925718b3ba0aade22

      SHA1

      fc8e9b10c83e16eb0af1b6f10128f5c37b389682

      SHA256

      cb42fac1aebb6e1ac4907a38035b218b5f992d1bcd4dece11b1664a588e876e4

      SHA512

      37f2c132b632c8e5a336bdc773d953c7f39872b1bae2ba34fbaf7794a477fd0dcb9ff60a3ddb447fe76abd98e557bd5ee544876584adea152b0841b3e313054c