Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    22-08-2024 18:09

General

  • Target

    1997ce14984d4934d8de66cffd04ae80N.exe

  • Size

    2.0MB

  • MD5

    1997ce14984d4934d8de66cffd04ae80

  • SHA1

    6ee9ecae95f8246284df2301f87ac4e688a63e38

  • SHA256

    c77d02ff3c121a9b6f1363abc64e6daeb1f183df47f3e95802092c0712a988a4

  • SHA512

    1f9ca7d99bae63b8f1da115121c17f0b7e6e8b2d4fc93f8b360ca41ac03e0958cf4731083a3017a9911cae89a11dd703d0fb3cbede99a1235fe7bb3ea47c907e

  • SSDEEP

    49152:AHyPzhp8e40llgHZr4WeSUoKXEnorZ3HGP0gZ/szKn:9P4mlg5rXKXEMmP0gyA

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1997ce14984d4934d8de66cffd04ae80N.exe
    "C:\Users\Admin\AppData\Local\Temp\1997ce14984d4934d8de66cffd04ae80N.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1424
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Boot or Logon Autostart Execution: Active Setup
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2780
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2436
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Boot or Logon Autostart Execution: Active Setup
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2068
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:320
          • C:\Windows\SysWOW64\at.exe
            at 18:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2220
          • C:\Windows\SysWOW64\at.exe
            at 18:12 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\mrsys.exe

    Filesize

    2.0MB

    MD5

    864c7037bec284a85f601cdad4d8afaf

    SHA1

    80f646e760af58a49cdada748ad5e591d58f30cd

    SHA256

    534a2490c182b616305cfa90edb9bb0f55e432baece2d729c65955295ea8e190

    SHA512

    bbbad3c05bdab32f1f1e7c03f5cd3df7cb66d7ac685ba9c5632893baac49399b12d743077e55a53dd03e8e47c6d8d1b10a3feaf281664604c2a0f1d17c6a700e

  • \Windows\system\explorer.exe

    Filesize

    2.0MB

    MD5

    df49c6e2e55268861213132dd7f6efd3

    SHA1

    c81a9250f93608f6adca00015d14ce208cea5a54

    SHA256

    d8072526d9b075912c7c0110d51f351a1c96694b31d66e94bea1d43e2c1e5f98

    SHA512

    bd290281b719534a53831899212aea3acd3abeaad10cc4e4c124a51f40c4d4bca87424287dbaf7cb0dfd96d7b3d7689db4ce9105e7cdc93b50a1a9f3f7e7c8aa

  • \Windows\system\spoolsv.exe

    Filesize

    2.0MB

    MD5

    07acdf7884673fc7ed652764af1e9f7b

    SHA1

    27721a0002efdfbbbb5d9931014a8caafac427a6

    SHA256

    db0d771e92a8e62b911edd1fe9f424a61d7e16f8d93c855bb5c19afc9ca665b6

    SHA512

    1db55754631ceb2a91f0714c631495599b16720a224906c0d13f310a91ad5ad44f490210e80e0f8909b3e73cfbb3dd054e225596f24c0c4a3115984cdf06b7ba

  • \Windows\system\svchost.exe

    Filesize

    2.0MB

    MD5

    6988240037abc9b11b04e7ddd2008381

    SHA1

    6eb5cecd3c86fea22f944492288fdeb3e2f64fd1

    SHA256

    5ca8320ee97a2b63796d3853154d9d9acd70d0b17ddc7bd22a9c6f149b8e1555

    SHA512

    b8995a747f0b00e3853c216a0b9932c2b4700e9c78629b634012e5c72111b1af2c2156cce0b6b0d2066b23f909b2990952514bcdf42df9cbd7627d2e89c6ee43

  • memory/320-57-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/320-65-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/1424-15-0x0000000005970000-0x0000000005E13000-memory.dmp

    Filesize

    4.6MB

  • memory/1424-0-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/1424-14-0x0000000005970000-0x0000000005E13000-memory.dmp

    Filesize

    4.6MB

  • memory/1424-70-0x0000000076C60000-0x0000000076D50000-memory.dmp

    Filesize

    960KB

  • memory/1424-2-0x0000000076C60000-0x0000000076D50000-memory.dmp

    Filesize

    960KB

  • memory/1424-45-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/1424-47-0x0000000076C60000-0x0000000076D50000-memory.dmp

    Filesize

    960KB

  • memory/1424-1-0x0000000076C70000-0x0000000076C71000-memory.dmp

    Filesize

    4KB

  • memory/1424-69-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2068-94-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2068-78-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2068-56-0x0000000005760000-0x0000000005C03000-memory.dmp

    Filesize

    4.6MB

  • memory/2068-82-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2068-86-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2068-80-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2068-84-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2068-96-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2068-92-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2068-74-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2068-75-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2068-76-0x0000000005760000-0x0000000005C03000-memory.dmp

    Filesize

    4.6MB

  • memory/2068-90-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2068-58-0x0000000005760000-0x0000000005C03000-memory.dmp

    Filesize

    4.6MB

  • memory/2068-88-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2436-32-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2436-46-0x0000000005860000-0x0000000005D03000-memory.dmp

    Filesize

    4.6MB

  • memory/2436-68-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2780-72-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2780-83-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2780-85-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2780-81-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2780-87-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2780-79-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2780-89-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2780-77-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2780-91-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2780-73-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2780-93-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2780-30-0x0000000005800000-0x0000000005CA3000-memory.dmp

    Filesize

    4.6MB

  • memory/2780-95-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB

  • memory/2780-17-0x0000000000400000-0x00000000008A3000-memory.dmp

    Filesize

    4.6MB