Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 14:07
Static task
static1
Behavioral task
behavioral1
Sample
1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe
Resource
win7-20240704-en
General
-
Target
1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe
-
Size
9.1MB
-
MD5
8c4a8c70e65686184b1713fd5d9475e5
-
SHA1
b4ae29264869f932d999b7d9729eee4543bd0747
-
SHA256
1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984
-
SHA512
692447b769f0e4d0401713ed494c4160fe37cdff37584d62cb7b24a778a3e6ea91d2291f3c3b7ffb0d151ffd91ea12461e40c4d2b5c7d5e7f538c2c3d614ad7a
-
SSDEEP
196608:yW1pXAmPFRLzZCZW8/PgcSS3uQyl620Y:yW1pwmPFRXgHeQ8620
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ VMware.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion VMware.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion VMware.exe -
Executes dropped EXE 2 IoCs
pid Process 2744 VMware.exe 2604 MHAutoPatch登入器.exe -
Loads dropped DLL 7 IoCs
pid Process 2480 1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe 2480 1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe 2480 1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe 2744 VMware.exe 2480 1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe 2480 1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe 2480 1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe -
resource yara_rule behavioral1/files/0x0008000000017462-24.dat themida behavioral1/memory/2744-26-0x0000000010000000-0x0000000010AB7000-memory.dmp themida behavioral1/memory/2744-27-0x0000000010000000-0x0000000010AB7000-memory.dmp themida behavioral1/memory/2744-43-0x0000000010000000-0x0000000010AB7000-memory.dmp themida behavioral1/memory/2744-44-0x0000000010000000-0x0000000010AB7000-memory.dmp themida behavioral1/memory/2744-46-0x0000000010000000-0x0000000010AB7000-memory.dmp themida behavioral1/memory/2744-48-0x0000000010000000-0x0000000010AB7000-memory.dmp themida behavioral1/memory/2744-50-0x0000000010000000-0x0000000010AB7000-memory.dmp themida behavioral1/memory/2744-53-0x0000000010000000-0x0000000010AB7000-memory.dmp themida behavioral1/memory/2744-54-0x0000000010000000-0x0000000010AB7000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA VMware.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VMware.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2744 2480 1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe 31 PID 2480 wrote to memory of 2744 2480 1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe 31 PID 2480 wrote to memory of 2744 2480 1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe 31 PID 2480 wrote to memory of 2744 2480 1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe 31 PID 2480 wrote to memory of 2604 2480 1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe 33 PID 2480 wrote to memory of 2604 2480 1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe 33 PID 2480 wrote to memory of 2604 2480 1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe 33 PID 2480 wrote to memory of 2604 2480 1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe 33 PID 2480 wrote to memory of 2604 2480 1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe 33 PID 2480 wrote to memory of 2604 2480 1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe 33 PID 2480 wrote to memory of 2604 2480 1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe"C:\Users\Admin\AppData\Local\Temp\1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\GameShield\X2vqtMiSWb6hdVzC\VMware.exe"C:\Users\Admin\AppData\Local\GameShield\X2vqtMiSWb6hdVzC\VMware.exe" --file "C:\Users\Admin\AppData\LocalLow\GameShield\27f70b94ae1dbf5a.dat" --debug TCfV5vUSYLDEjbpj2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\MHAutoPatch登入器.exe"C:\Users\Admin\AppData\Local\Temp\MHAutoPatch登入器.exe"2⤵
- Executes dropped EXE
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\GameShield\0bdd5784fc0e47d55cf21ecc353bee09\0bdd5784fc0e47d55cf21ecc353bee09.log
Filesize5B
MD5d1a342bb3f725967660b92ec62db720f
SHA1d5e37f7cee768c2c1b00de5af7e87f60e911567f
SHA2561567a42a0f959939c5d568ccbf29e23f8fec50b82b478dae4150747f2851f361
SHA512ef7caa566eecbd654f12098a57af8fb056a0d884b17eea2d4f022773723258552c017c6b28a9a8ab01fd0d8fd4aeccc65a1300c30208d9fab0134173f438a106
-
Filesize
304B
MD5ce08917fbe4fa6d50d81ca3edf372e25
SHA16adb8c09ecc602df23320af6ed4468e2cd6916b0
SHA256a0a10f83e4f6d139d808a59dd1a033f5a6fe5b8e1a4e4c61ac369cce9d498016
SHA51210367110d1a687c20469a7815ac1809e4d9dc829589320cb001e3a378405359ddd98358fafa7f6a6f5de87c3b3da45b5b795e66c8dba618da58313862353fddf
-
Filesize
7.2MB
MD50625693de76a97d13e308c71d8060e15
SHA1e5eb64f8723046c148931216898d875cb0536e69
SHA256277874869fe2a29a8a5c3c23c3c3932f67a6a60885291c2231dcc07079c1bfa6
SHA512ae7a109efe77337588ea7ea03a4c959b394fec5ab4ab1c973b11e8098790866e784427ce4cd8d3a5ab1b71fda71e1efc7c9054676c8fd8e0d490812436eafe7a
-
Filesize
757KB
MD5f074863c54235c114510283250d9690e
SHA122b1c4c2e4730edd4f4d7d8dfc9e0169e83116d4
SHA256dd21d5c999b1c13ff7e861078947da0c7eb4179627df8ffaca065868ed0d2b89
SHA512041dc9fac6947ffce1ee62e061810b4f577d2d1418be944d1a65b633335fab359e23a8e1f2295e6e04b63aabff6e954df31582783a9a14d96f79594897f7e0dd
-
Filesize
112KB
MD5d4736d7dead55676c8f42c92bbe01420
SHA1737179a8c52c0eac9fbd3121b5c313e4d1fe372a
SHA2569205116263333633a1fbc9b2a88cfd5c05f0bd8ec3f330303c52f53255f1307f
SHA5121b139a1d415e9ed8e10a664eb9f02a413f9c8c561ae1b17012e2f062dc8a9611a52307f2acbe4607cb545b9402be5916ef1a75b57b68526f923d4d3e33094169