Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 21:01

General

  • Target

    52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe

  • Size

    2.6MB

  • MD5

    011babd2d6d343377abae9184aa12d70

  • SHA1

    2d44e48fd1672f88c9b776ea24e21e5143bea471

  • SHA256

    52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126

  • SHA512

    eb1790737980ecd9ddfb0a8878f6ef05be4d9f3d6651c894e91255bb5cea314c57f7a5b621e851dbe44c732d8d77483b10c49675e8391b369000d7f18a9f699c

  • SSDEEP

    49152:lW5IvAG44oOCdcSzNIJG70V6Do4yV/5mc5aNZJ350zg5bEJ60IZGnpw/Yp:lW5G4DOT5JGIVzh/5aZX0zgd0IZGpww

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Themida packer 20 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe
    "C:\Users\Admin\AppData\Local\Temp\52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2704
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2812
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2880
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in System32 directory
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2700
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2576
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 21:03 /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:2452
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 21:04 /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:320
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 21:05 /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:828
      • C:\Windows\Explorer.exe
        C:\Windows\Explorer.exe
        3⤵
          PID:2220

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Resources\spoolsv.exe

      Filesize

      2.6MB

      MD5

      c7bca2461296d772b25e15b5a35e9f95

      SHA1

      c4872c83707253eb504bcd3dad97fae522ba07c1

      SHA256

      781f3b87dead52936c3e1f8b2ea321403c77837181cd50b4ee0df0f554a8fa7d

      SHA512

      896bc02e706f6dc10c2e64aff51c2cd846d595104aecca10a9d8606f1c7e1eb0480083c0b16a4cd68ae315aaeb1620f37958a7eb157718a480556233a7b4f396

    • \Windows\Resources\Themes\explorer.exe

      Filesize

      2.6MB

      MD5

      61fc122fc2606154e34e8d1201890790

      SHA1

      50d28b22dfae3d2bd2bcca855429cbfd9d45d981

      SHA256

      2a43b505d4f7a8c324eb02c4b369221b300d12728079388b1e207d445d33af02

      SHA512

      921926287d1f35161a49d7f1d8f94b487c801cbac83151c814b10ad004127a21fff7c6581a8dec1b146ced3647656b91aa41c21150b1287e8e0eb130a022b9bd

    • \Windows\Resources\svchost.exe

      Filesize

      2.6MB

      MD5

      a26c180f8fba9877d8d2a81218b9a5ee

      SHA1

      eddb1a666e86b882b2b6410b39326d57f2134be2

      SHA256

      7fe3b8bd87722049a21e70ea6d6b4643e0959766b1573fa43fc7145059c8a876

      SHA512

      a0f2ce43ffbfb47bb43c20239d1820ed21429bc6e509d1058d78f9a3f762a04f8670e10ab2b524416cbc494a349bdc0df6a71d94f017adb8a385bde988ce0719

    • memory/2576-49-0x0000000000400000-0x0000000000A13000-memory.dmp

      Filesize

      6.1MB

    • memory/2576-43-0x0000000000400000-0x0000000000A13000-memory.dmp

      Filesize

      6.1MB

    • memory/2700-35-0x0000000000400000-0x0000000000A13000-memory.dmp

      Filesize

      6.1MB

    • memory/2700-79-0x0000000000400000-0x0000000000A13000-memory.dmp

      Filesize

      6.1MB

    • memory/2700-55-0x0000000000400000-0x0000000000A13000-memory.dmp

      Filesize

      6.1MB

    • memory/2704-53-0x0000000000400000-0x0000000000A13000-memory.dmp

      Filesize

      6.1MB

    • memory/2704-1-0x0000000076FC0000-0x0000000076FC2000-memory.dmp

      Filesize

      8KB

    • memory/2704-42-0x0000000000400000-0x0000000000A13000-memory.dmp

      Filesize

      6.1MB

    • memory/2704-44-0x0000000003600000-0x0000000003C13000-memory.dmp

      Filesize

      6.1MB

    • memory/2704-0-0x0000000000400000-0x0000000000A13000-memory.dmp

      Filesize

      6.1MB

    • memory/2812-56-0x0000000000400000-0x0000000000A13000-memory.dmp

      Filesize

      6.1MB

    • memory/2812-22-0x00000000037F0000-0x0000000003E03000-memory.dmp

      Filesize

      6.1MB

    • memory/2812-54-0x0000000000400000-0x0000000000A13000-memory.dmp

      Filesize

      6.1MB

    • memory/2812-11-0x0000000000400000-0x0000000000A13000-memory.dmp

      Filesize

      6.1MB

    • memory/2812-64-0x0000000000400000-0x0000000000A13000-memory.dmp

      Filesize

      6.1MB

    • memory/2812-68-0x0000000000400000-0x0000000000A13000-memory.dmp

      Filesize

      6.1MB

    • memory/2812-78-0x0000000000400000-0x0000000000A13000-memory.dmp

      Filesize

      6.1MB

    • memory/2880-51-0x0000000000400000-0x0000000000A13000-memory.dmp

      Filesize

      6.1MB

    • memory/2880-34-0x0000000003630000-0x0000000003C43000-memory.dmp

      Filesize

      6.1MB

    • memory/2880-23-0x0000000000400000-0x0000000000A13000-memory.dmp

      Filesize

      6.1MB