Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 20:27
Behavioral task
behavioral1
Sample
368f80fd75e51f4aeaaf89ff2fb7d5f0N.exe
Resource
win7-20240704-en
General
-
Target
368f80fd75e51f4aeaaf89ff2fb7d5f0N.exe
-
Size
6.9MB
-
MD5
368f80fd75e51f4aeaaf89ff2fb7d5f0
-
SHA1
df8cc8a60a012b2e019dfde775d8e8567ddef888
-
SHA256
1944688ceca74de96b3d32dc9f2003a97aa56ef3f970c6eacf926f6f688450c9
-
SHA512
9cac22e3a0971ec68f90b602f8bb828677bb529579b0defd788522fafd437edce726aed5e54aec78c9a3d37a8fec5bd99ce5adf2870a6ec713ab64237030f6bc
-
SSDEEP
196608:pxTaLHqLRq7srzQT09F3tNw1Mqde6bWCjt:7TaLKLRo08T0v3EKet
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ keymgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ keymgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ keymgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 368f80fd75e51f4aeaaf89ff2fb7d5f0N.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion keymgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion keymgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 368f80fd75e51f4aeaaf89ff2fb7d5f0N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 368f80fd75e51f4aeaaf89ff2fb7d5f0N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion keymgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion keymgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion keymgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion keymgr.exe -
Executes dropped EXE 3 IoCs
pid Process 2772 keymgr.exe 2856 keymgr.exe 1732 keymgr.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 1080 icacls.exe 2860 icacls.exe 2696 icacls.exe -
resource yara_rule behavioral1/memory/2488-0-0x0000000001340000-0x0000000002206000-memory.dmp themida behavioral1/memory/2488-35-0x0000000001340000-0x0000000002206000-memory.dmp themida behavioral1/memory/2488-41-0x0000000001340000-0x0000000002206000-memory.dmp themida behavioral1/memory/2488-42-0x0000000001340000-0x0000000002206000-memory.dmp themida behavioral1/memory/2488-46-0x0000000001340000-0x0000000002206000-memory.dmp themida behavioral1/memory/2488-45-0x0000000001340000-0x0000000002206000-memory.dmp themida behavioral1/memory/2488-49-0x0000000001340000-0x0000000002206000-memory.dmp themida behavioral1/memory/2488-48-0x0000000001340000-0x0000000002206000-memory.dmp themida behavioral1/memory/2488-44-0x0000000001340000-0x0000000002206000-memory.dmp themida behavioral1/memory/2488-40-0x0000000001340000-0x0000000002206000-memory.dmp themida behavioral1/memory/2488-47-0x0000000001340000-0x0000000002206000-memory.dmp themida behavioral1/memory/2488-43-0x0000000001340000-0x0000000002206000-memory.dmp themida behavioral1/memory/2488-38-0x0000000001340000-0x0000000002206000-memory.dmp themida behavioral1/memory/2488-39-0x0000000001340000-0x0000000002206000-memory.dmp themida behavioral1/memory/2488-51-0x0000000001340000-0x0000000002206000-memory.dmp themida behavioral1/memory/2772-54-0x0000000001340000-0x0000000002206000-memory.dmp themida behavioral1/files/0x00070000000194b1-53.dat themida behavioral1/memory/2856-56-0x0000000001340000-0x0000000002206000-memory.dmp themida behavioral1/memory/2856-150-0x0000000001340000-0x0000000002206000-memory.dmp themida behavioral1/memory/2772-151-0x0000000001340000-0x0000000002206000-memory.dmp themida behavioral1/memory/1732-158-0x0000000001340000-0x0000000002206000-memory.dmp themida behavioral1/memory/1732-206-0x0000000001340000-0x0000000002206000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 368f80fd75e51f4aeaaf89ff2fb7d5f0N.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA keymgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA keymgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA keymgr.exe -
AutoIT Executable 15 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2488-41-0x0000000001340000-0x0000000002206000-memory.dmp autoit_exe behavioral1/memory/2488-42-0x0000000001340000-0x0000000002206000-memory.dmp autoit_exe behavioral1/memory/2488-46-0x0000000001340000-0x0000000002206000-memory.dmp autoit_exe behavioral1/memory/2488-45-0x0000000001340000-0x0000000002206000-memory.dmp autoit_exe behavioral1/memory/2488-49-0x0000000001340000-0x0000000002206000-memory.dmp autoit_exe behavioral1/memory/2488-48-0x0000000001340000-0x0000000002206000-memory.dmp autoit_exe behavioral1/memory/2488-44-0x0000000001340000-0x0000000002206000-memory.dmp autoit_exe behavioral1/memory/2488-40-0x0000000001340000-0x0000000002206000-memory.dmp autoit_exe behavioral1/memory/2488-47-0x0000000001340000-0x0000000002206000-memory.dmp autoit_exe behavioral1/memory/2488-43-0x0000000001340000-0x0000000002206000-memory.dmp autoit_exe behavioral1/memory/2488-39-0x0000000001340000-0x0000000002206000-memory.dmp autoit_exe behavioral1/memory/2488-51-0x0000000001340000-0x0000000002206000-memory.dmp autoit_exe behavioral1/memory/2856-150-0x0000000001340000-0x0000000002206000-memory.dmp autoit_exe behavioral1/memory/2772-151-0x0000000001340000-0x0000000002206000-memory.dmp autoit_exe behavioral1/memory/1732-206-0x0000000001340000-0x0000000002206000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2488 368f80fd75e51f4aeaaf89ff2fb7d5f0N.exe 2856 keymgr.exe 2772 keymgr.exe 1732 keymgr.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keymgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keymgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keymgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 368f80fd75e51f4aeaaf89ff2fb7d5f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2488 368f80fd75e51f4aeaaf89ff2fb7d5f0N.exe 2488 368f80fd75e51f4aeaaf89ff2fb7d5f0N.exe 2856 keymgr.exe 2856 keymgr.exe 2772 keymgr.exe 2772 keymgr.exe 1732 keymgr.exe 1732 keymgr.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2488 368f80fd75e51f4aeaaf89ff2fb7d5f0N.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2824 2488 368f80fd75e51f4aeaaf89ff2fb7d5f0N.exe 31 PID 2488 wrote to memory of 2824 2488 368f80fd75e51f4aeaaf89ff2fb7d5f0N.exe 31 PID 2488 wrote to memory of 2824 2488 368f80fd75e51f4aeaaf89ff2fb7d5f0N.exe 31 PID 2488 wrote to memory of 2824 2488 368f80fd75e51f4aeaaf89ff2fb7d5f0N.exe 31 PID 2824 wrote to memory of 1080 2824 cmd.exe 34 PID 2824 wrote to memory of 1080 2824 cmd.exe 34 PID 2824 wrote to memory of 1080 2824 cmd.exe 34 PID 2824 wrote to memory of 1080 2824 cmd.exe 34 PID 2704 wrote to memory of 2772 2704 taskeng.exe 35 PID 2704 wrote to memory of 2772 2704 taskeng.exe 35 PID 2704 wrote to memory of 2772 2704 taskeng.exe 35 PID 2704 wrote to memory of 2772 2704 taskeng.exe 35 PID 2704 wrote to memory of 2856 2704 taskeng.exe 36 PID 2704 wrote to memory of 2856 2704 taskeng.exe 36 PID 2704 wrote to memory of 2856 2704 taskeng.exe 36 PID 2704 wrote to memory of 2856 2704 taskeng.exe 36 PID 2824 wrote to memory of 2860 2824 cmd.exe 37 PID 2824 wrote to memory of 2860 2824 cmd.exe 37 PID 2824 wrote to memory of 2860 2824 cmd.exe 37 PID 2824 wrote to memory of 2860 2824 cmd.exe 37 PID 2824 wrote to memory of 2696 2824 cmd.exe 38 PID 2824 wrote to memory of 2696 2824 cmd.exe 38 PID 2824 wrote to memory of 2696 2824 cmd.exe 38 PID 2824 wrote to memory of 2696 2824 cmd.exe 38 PID 2704 wrote to memory of 1732 2704 taskeng.exe 39 PID 2704 wrote to memory of 1732 2704 taskeng.exe 39 PID 2704 wrote to memory of 1732 2704 taskeng.exe 39 PID 2704 wrote to memory of 1732 2704 taskeng.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\368f80fd75e51f4aeaaf89ff2fb7d5f0N.exe"C:\Users\Admin\AppData\Local\Temp\368f80fd75e51f4aeaaf89ff2fb7d5f0N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)" & icacls "C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)" & icacls "C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480" /inheritance:e /deny "Admin:(R,REA,RA,RD)"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1080
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480" /inheritance:e /deny "Admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2696
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3090F66C-9AA9-42A6-94E0-8AC67CAE0F09} S-1-5-21-3294248377-1418901787-4083263181-1000:FMEDFXFE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exeC:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exeC:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exeC:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe
Filesize6.9MB
MD5368f80fd75e51f4aeaaf89ff2fb7d5f0
SHA1df8cc8a60a012b2e019dfde775d8e8567ddef888
SHA2561944688ceca74de96b3d32dc9f2003a97aa56ef3f970c6eacf926f6f688450c9
SHA5129cac22e3a0971ec68f90b602f8bb828677bb529579b0defd788522fafd437edce726aed5e54aec78c9a3d37a8fec5bd99ce5adf2870a6ec713ab64237030f6bc