Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 21:01
Behavioral task
behavioral1
Sample
52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe
Resource
win10v2004-20240802-en
General
-
Target
52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe
-
Size
2.6MB
-
MD5
011babd2d6d343377abae9184aa12d70
-
SHA1
2d44e48fd1672f88c9b776ea24e21e5143bea471
-
SHA256
52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126
-
SHA512
eb1790737980ecd9ddfb0a8878f6ef05be4d9f3d6651c894e91255bb5cea314c57f7a5b621e851dbe44c732d8d77483b10c49675e8391b369000d7f18a9f699c
-
SSDEEP
49152:lW5IvAG44oOCdcSzNIJG70V6Do4yV/5mc5aNZJ350zg5bEJ60IZGnpw/Yp:lW5G4DOT5JGIVzh/5aZX0zgd0IZGpww
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 2812 explorer.exe 2880 spoolsv.exe 2700 svchost.exe 2576 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2812 explorer.exe 2880 spoolsv.exe 2700 svchost.exe -
resource yara_rule behavioral1/memory/2704-0-0x0000000000400000-0x0000000000A13000-memory.dmp themida behavioral1/files/0x0009000000017070-7.dat themida behavioral1/memory/2812-11-0x0000000000400000-0x0000000000A13000-memory.dmp themida behavioral1/files/0x00090000000172a7-17.dat themida behavioral1/memory/2812-22-0x00000000037F0000-0x0000000003E03000-memory.dmp themida behavioral1/memory/2880-23-0x0000000000400000-0x0000000000A13000-memory.dmp themida behavioral1/files/0x002e000000016e08-30.dat themida behavioral1/memory/2700-35-0x0000000000400000-0x0000000000A13000-memory.dmp themida behavioral1/memory/2704-42-0x0000000000400000-0x0000000000A13000-memory.dmp themida behavioral1/memory/2576-43-0x0000000000400000-0x0000000000A13000-memory.dmp themida behavioral1/memory/2576-49-0x0000000000400000-0x0000000000A13000-memory.dmp themida behavioral1/memory/2880-51-0x0000000000400000-0x0000000000A13000-memory.dmp themida behavioral1/memory/2704-53-0x0000000000400000-0x0000000000A13000-memory.dmp themida behavioral1/memory/2812-54-0x0000000000400000-0x0000000000A13000-memory.dmp themida behavioral1/memory/2700-55-0x0000000000400000-0x0000000000A13000-memory.dmp themida behavioral1/memory/2812-56-0x0000000000400000-0x0000000000A13000-memory.dmp themida behavioral1/memory/2812-64-0x0000000000400000-0x0000000000A13000-memory.dmp themida behavioral1/memory/2812-68-0x0000000000400000-0x0000000000A13000-memory.dmp themida behavioral1/memory/2812-78-0x0000000000400000-0x0000000000A13000-memory.dmp themida behavioral1/memory/2700-79-0x0000000000400000-0x0000000000A13000-memory.dmp themida -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2812 explorer.exe 2880 spoolsv.exe 2700 svchost.exe 2576 spoolsv.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2452 schtasks.exe 320 schtasks.exe 828 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2812 explorer.exe 2700 svchost.exe 2700 svchost.exe 2812 explorer.exe 2812 explorer.exe 2700 svchost.exe 2812 explorer.exe 2700 svchost.exe 2812 explorer.exe 2700 svchost.exe 2812 explorer.exe 2700 svchost.exe 2700 svchost.exe 2812 explorer.exe 2700 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2700 svchost.exe 2812 explorer.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 2812 explorer.exe 2812 explorer.exe 2880 spoolsv.exe 2880 spoolsv.exe 2700 svchost.exe 2700 svchost.exe 2576 spoolsv.exe 2576 spoolsv.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2812 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 31 PID 2704 wrote to memory of 2812 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 31 PID 2704 wrote to memory of 2812 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 31 PID 2704 wrote to memory of 2812 2704 52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe 31 PID 2812 wrote to memory of 2880 2812 explorer.exe 32 PID 2812 wrote to memory of 2880 2812 explorer.exe 32 PID 2812 wrote to memory of 2880 2812 explorer.exe 32 PID 2812 wrote to memory of 2880 2812 explorer.exe 32 PID 2880 wrote to memory of 2700 2880 spoolsv.exe 33 PID 2880 wrote to memory of 2700 2880 spoolsv.exe 33 PID 2880 wrote to memory of 2700 2880 spoolsv.exe 33 PID 2880 wrote to memory of 2700 2880 spoolsv.exe 33 PID 2700 wrote to memory of 2576 2700 svchost.exe 34 PID 2700 wrote to memory of 2576 2700 svchost.exe 34 PID 2700 wrote to memory of 2576 2700 svchost.exe 34 PID 2700 wrote to memory of 2576 2700 svchost.exe 34 PID 2812 wrote to memory of 2220 2812 explorer.exe 35 PID 2812 wrote to memory of 2220 2812 explorer.exe 35 PID 2812 wrote to memory of 2220 2812 explorer.exe 35 PID 2812 wrote to memory of 2220 2812 explorer.exe 35 PID 2700 wrote to memory of 2452 2700 svchost.exe 36 PID 2700 wrote to memory of 2452 2700 svchost.exe 36 PID 2700 wrote to memory of 2452 2700 svchost.exe 36 PID 2700 wrote to memory of 2452 2700 svchost.exe 36 PID 2700 wrote to memory of 320 2700 svchost.exe 39 PID 2700 wrote to memory of 320 2700 svchost.exe 39 PID 2700 wrote to memory of 320 2700 svchost.exe 39 PID 2700 wrote to memory of 320 2700 svchost.exe 39 PID 2700 wrote to memory of 828 2700 svchost.exe 41 PID 2700 wrote to memory of 828 2700 svchost.exe 41 PID 2700 wrote to memory of 828 2700 svchost.exe 41 PID 2700 wrote to memory of 828 2700 svchost.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe"C:\Users\Admin\AppData\Local\Temp\52f90f63dda1bd833077a53c8023e34e6ad63bb5c9ac8c68259a523e00c53126.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 21:03 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2452
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 21:04 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:320
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 21:05 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:828
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2220
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5c7bca2461296d772b25e15b5a35e9f95
SHA1c4872c83707253eb504bcd3dad97fae522ba07c1
SHA256781f3b87dead52936c3e1f8b2ea321403c77837181cd50b4ee0df0f554a8fa7d
SHA512896bc02e706f6dc10c2e64aff51c2cd846d595104aecca10a9d8606f1c7e1eb0480083c0b16a4cd68ae315aaeb1620f37958a7eb157718a480556233a7b4f396
-
Filesize
2.6MB
MD561fc122fc2606154e34e8d1201890790
SHA150d28b22dfae3d2bd2bcca855429cbfd9d45d981
SHA2562a43b505d4f7a8c324eb02c4b369221b300d12728079388b1e207d445d33af02
SHA512921926287d1f35161a49d7f1d8f94b487c801cbac83151c814b10ad004127a21fff7c6581a8dec1b146ced3647656b91aa41c21150b1287e8e0eb130a022b9bd
-
Filesize
2.6MB
MD5a26c180f8fba9877d8d2a81218b9a5ee
SHA1eddb1a666e86b882b2b6410b39326d57f2134be2
SHA2567fe3b8bd87722049a21e70ea6d6b4643e0959766b1573fa43fc7145059c8a876
SHA512a0f2ce43ffbfb47bb43c20239d1820ed21429bc6e509d1058d78f9a3f762a04f8670e10ab2b524416cbc494a349bdc0df6a71d94f017adb8a385bde988ce0719