Analysis
-
max time kernel
148s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 18:18
Behavioral task
behavioral1
Sample
MSSOLUTION2.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
MSSOLUTION2.exe
Resource
win10v2004-20240802-en
General
-
Target
MSSOLUTION2.exe
-
Size
4.0MB
-
MD5
139dcbaa31257304b6d21c001ae0a39b
-
SHA1
2de22168d5563e8457195445bab151877feacded
-
SHA256
855eaf837715b53f39ef38a6cf35611dcba17cd1a713aff5259fb4cad33f9e4a
-
SHA512
0b1a89b496c6dc2a2076e88d64938ebf45926e53c4916c43dbc0eeecb8702845f99040aa024021ed28c49e8cbdabcdf8b2caaa49904e35c5e702ada88492fa12
-
SSDEEP
98304:XUoFAcixoG77xOCIECEmSzw/v9+W2P5ndGkIiKwSl2Uh14s:nRAoGnMECvS0/vU/hzIi9Sl2bs
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MSSOLUTION2.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\HDGNWfqXeUqmatKSENRaAdSShmf\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\HDGNWfqXeUqmatKSENRaAdSShmf" mapper.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MSSOLUTION2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MSSOLUTION2.exe -
Executes dropped EXE 1 IoCs
pid Process 1880 mapper.exe -
resource yara_rule behavioral2/memory/3968-0-0x0000000140000000-0x0000000140AB5000-memory.dmp themida behavioral2/memory/3968-3-0x0000000140000000-0x0000000140AB5000-memory.dmp themida behavioral2/memory/3968-4-0x0000000140000000-0x0000000140AB5000-memory.dmp themida behavioral2/memory/3968-2-0x0000000140000000-0x0000000140AB5000-memory.dmp themida behavioral2/memory/3968-13-0x0000000140000000-0x0000000140AB5000-memory.dmp themida behavioral2/memory/3968-14-0x0000000140000000-0x0000000140AB5000-memory.dmp themida behavioral2/memory/3968-15-0x0000000140000000-0x0000000140AB5000-memory.dmp themida behavioral2/memory/3968-16-0x0000000140000000-0x0000000140AB5000-memory.dmp themida behavioral2/memory/3968-17-0x0000000140000000-0x0000000140AB5000-memory.dmp themida behavioral2/memory/3968-18-0x0000000140000000-0x0000000140AB5000-memory.dmp themida behavioral2/memory/3968-19-0x0000000140000000-0x0000000140AB5000-memory.dmp themida behavioral2/memory/3968-20-0x0000000140000000-0x0000000140AB5000-memory.dmp themida behavioral2/memory/3968-21-0x0000000140000000-0x0000000140AB5000-memory.dmp themida behavioral2/memory/3968-22-0x0000000140000000-0x0000000140AB5000-memory.dmp themida behavioral2/memory/3968-23-0x0000000140000000-0x0000000140AB5000-memory.dmp themida behavioral2/memory/3968-24-0x0000000140000000-0x0000000140AB5000-memory.dmp themida behavioral2/memory/3968-25-0x0000000140000000-0x0000000140AB5000-memory.dmp themida behavioral2/memory/3968-26-0x0000000140000000-0x0000000140AB5000-memory.dmp themida behavioral2/memory/3968-27-0x0000000140000000-0x0000000140AB5000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MSSOLUTION2.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\Tasks\driver.sys MSSOLUTION2.exe File created C:\Windows\System32\Tasks\mapper.exe MSSOLUTION2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3968 MSSOLUTION2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1880 mapper.exe 1880 mapper.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1880 mapper.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 1880 mapper.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3968 wrote to memory of 1880 3968 MSSOLUTION2.exe 87 PID 3968 wrote to memory of 1880 3968 MSSOLUTION2.exe 87 PID 3968 wrote to memory of 3024 3968 MSSOLUTION2.exe 88 PID 3968 wrote to memory of 3024 3968 MSSOLUTION2.exe 88 PID 1880 wrote to memory of 1424 1880 mapper.exe 90 PID 1880 wrote to memory of 1424 1880 mapper.exe 90 PID 3968 wrote to memory of 4888 3968 MSSOLUTION2.exe 95 PID 3968 wrote to memory of 4888 3968 MSSOLUTION2.exe 95 PID 3968 wrote to memory of 4776 3968 MSSOLUTION2.exe 99 PID 3968 wrote to memory of 4776 3968 MSSOLUTION2.exe 99 PID 3968 wrote to memory of 4544 3968 MSSOLUTION2.exe 102 PID 3968 wrote to memory of 4544 3968 MSSOLUTION2.exe 102 PID 3968 wrote to memory of 4660 3968 MSSOLUTION2.exe 103 PID 3968 wrote to memory of 4660 3968 MSSOLUTION2.exe 103 PID 3968 wrote to memory of 1692 3968 MSSOLUTION2.exe 104 PID 3968 wrote to memory of 1692 3968 MSSOLUTION2.exe 104 PID 3968 wrote to memory of 3696 3968 MSSOLUTION2.exe 105 PID 3968 wrote to memory of 3696 3968 MSSOLUTION2.exe 105 PID 3968 wrote to memory of 2960 3968 MSSOLUTION2.exe 106 PID 3968 wrote to memory of 2960 3968 MSSOLUTION2.exe 106 PID 3968 wrote to memory of 728 3968 MSSOLUTION2.exe 107 PID 3968 wrote to memory of 728 3968 MSSOLUTION2.exe 107 PID 3968 wrote to memory of 760 3968 MSSOLUTION2.exe 110 PID 3968 wrote to memory of 760 3968 MSSOLUTION2.exe 110 PID 3968 wrote to memory of 2308 3968 MSSOLUTION2.exe 111 PID 3968 wrote to memory of 2308 3968 MSSOLUTION2.exe 111 PID 3968 wrote to memory of 4244 3968 MSSOLUTION2.exe 112 PID 3968 wrote to memory of 4244 3968 MSSOLUTION2.exe 112 PID 3968 wrote to memory of 4340 3968 MSSOLUTION2.exe 113 PID 3968 wrote to memory of 4340 3968 MSSOLUTION2.exe 113 PID 3968 wrote to memory of 536 3968 MSSOLUTION2.exe 114 PID 3968 wrote to memory of 536 3968 MSSOLUTION2.exe 114 PID 3968 wrote to memory of 4708 3968 MSSOLUTION2.exe 115 PID 3968 wrote to memory of 4708 3968 MSSOLUTION2.exe 115 PID 3968 wrote to memory of 1256 3968 MSSOLUTION2.exe 116 PID 3968 wrote to memory of 1256 3968 MSSOLUTION2.exe 116 PID 3968 wrote to memory of 1484 3968 MSSOLUTION2.exe 118 PID 3968 wrote to memory of 1484 3968 MSSOLUTION2.exe 118 PID 3968 wrote to memory of 2088 3968 MSSOLUTION2.exe 119 PID 3968 wrote to memory of 2088 3968 MSSOLUTION2.exe 119 PID 3968 wrote to memory of 2420 3968 MSSOLUTION2.exe 120 PID 3968 wrote to memory of 2420 3968 MSSOLUTION2.exe 120 PID 3968 wrote to memory of 4964 3968 MSSOLUTION2.exe 121 PID 3968 wrote to memory of 4964 3968 MSSOLUTION2.exe 121 PID 3968 wrote to memory of 4804 3968 MSSOLUTION2.exe 123 PID 3968 wrote to memory of 4804 3968 MSSOLUTION2.exe 123 PID 3968 wrote to memory of 3572 3968 MSSOLUTION2.exe 124 PID 3968 wrote to memory of 3572 3968 MSSOLUTION2.exe 124 PID 3968 wrote to memory of 4712 3968 MSSOLUTION2.exe 125 PID 3968 wrote to memory of 4712 3968 MSSOLUTION2.exe 125 PID 3968 wrote to memory of 1696 3968 MSSOLUTION2.exe 126 PID 3968 wrote to memory of 1696 3968 MSSOLUTION2.exe 126 PID 3968 wrote to memory of 1236 3968 MSSOLUTION2.exe 127 PID 3968 wrote to memory of 1236 3968 MSSOLUTION2.exe 127 PID 3968 wrote to memory of 3048 3968 MSSOLUTION2.exe 128 PID 3968 wrote to memory of 3048 3968 MSSOLUTION2.exe 128 PID 3968 wrote to memory of 1536 3968 MSSOLUTION2.exe 129 PID 3968 wrote to memory of 1536 3968 MSSOLUTION2.exe 129 PID 3968 wrote to memory of 1884 3968 MSSOLUTION2.exe 130 PID 3968 wrote to memory of 1884 3968 MSSOLUTION2.exe 130 PID 3968 wrote to memory of 216 3968 MSSOLUTION2.exe 131 PID 3968 wrote to memory of 216 3968 MSSOLUTION2.exe 131 PID 3968 wrote to memory of 4696 3968 MSSOLUTION2.exe 132 PID 3968 wrote to memory of 4696 3968 MSSOLUTION2.exe 132
Processes
-
C:\Users\Admin\AppData\Local\Temp\MSSOLUTION2.exe"C:\Users\Admin\AppData\Local\Temp\MSSOLUTION2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\System32\Tasks\mapper.exeC:\Windows\System32\Tasks\mapper.exe C:\Windows\System32\Tasks\driver.sys > NUL 2>&12⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c title Venom Solution3⤵PID:1424
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 52⤵PID:3024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:4776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:4544
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:4660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:1692
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:3696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:2960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:2308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:4244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:4340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:4708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:1256
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:1484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:2088
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:2420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:4964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:4804
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:3572
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:4712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:1696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:1236
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:3048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:1536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:1884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:4696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:312
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:4316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:4752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:5044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:4520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:828
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:1256
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:2216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:2968
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:2856
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:2056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:3788
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:1948
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:4692
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:1912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:1960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:4124
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:4020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
530KB
MD5e64a27c9cddaef671eb2676c5ef38129
SHA11127c6ca536514881727711d7b7b6a66e7442835
SHA256cbb2682983d3248dd5403141382a909c4ae8a0f3e27b605be3ee93f6cb76f804
SHA512a96ddb28ccfbbe9224f22fb9db51689573a1325568082b0c8a760b48850a72f82daba14115a872140ecf2d706cafb2e7823c85bd3587e95664bb02bc8336525f