Analysis
-
max time kernel
101s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 05:50
Static task
static1
Behavioral task
behavioral1
Sample
bcca5060b97d4b003bd960ca7afa9600N.exe
Resource
win7-20240708-en
General
-
Target
bcca5060b97d4b003bd960ca7afa9600N.exe
-
Size
897KB
-
MD5
bcca5060b97d4b003bd960ca7afa9600
-
SHA1
c98d164bc3b564f53cbc9ec55c9ca62eb5305d73
-
SHA256
b40c65c49b987514cf7edf1287b5562d9dee506835e7208302bfecf71edd44c1
-
SHA512
8044a79937145b7f87ecbbb9fe487ce2e320bf445545e32bc425e9530dcebc3fcead1b12a32212ed6727b15f78b36d84124332593d7f0a9a6a880a72e1774186
-
SSDEEP
24576:7PT80SR76+GxaDhSDdrdpgukMjK/k//Ml:M0SROiSDNgurK3
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bcca5060b97d4b003bd960ca7afa9600N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Executes dropped EXE 1 IoCs
pid Process 2540 Setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN bcca5060b97d4b003bd960ca7afa9600N.exe File opened (read-only) \??\VBoxMiniRdrDN Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcca5060b97d4b003bd960ca7afa9600N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4468 wrote to memory of 2540 4468 bcca5060b97d4b003bd960ca7afa9600N.exe 87 PID 4468 wrote to memory of 2540 4468 bcca5060b97d4b003bd960ca7afa9600N.exe 87 PID 4468 wrote to memory of 2540 4468 bcca5060b97d4b003bd960ca7afa9600N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcca5060b97d4b003bd960ca7afa9600N.exe"C:\Users\Admin\AppData\Local\Temp\bcca5060b97d4b003bd960ca7afa9600N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\a2kYtVNjHa\gsedtRQE\Setup.exe"C:\Users\Admin\AppData\Local\Temp\a2kYtVNjHa\gsedtRQE\Setup.exe" --relaunch2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
897KB
MD5bcca5060b97d4b003bd960ca7afa9600
SHA1c98d164bc3b564f53cbc9ec55c9ca62eb5305d73
SHA256b40c65c49b987514cf7edf1287b5562d9dee506835e7208302bfecf71edd44c1
SHA5128044a79937145b7f87ecbbb9fe487ce2e320bf445545e32bc425e9530dcebc3fcead1b12a32212ed6727b15f78b36d84124332593d7f0a9a6a880a72e1774186