Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 02:58
Behavioral task
behavioral1
Sample
caae26b72d0960304e244c8434132840N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
caae26b72d0960304e244c8434132840N.exe
Resource
win10v2004-20240802-en
General
-
Target
caae26b72d0960304e244c8434132840N.exe
-
Size
2.5MB
-
MD5
caae26b72d0960304e244c8434132840
-
SHA1
bc4735a47cb28067a99d1db7ba2625f31e06ea7f
-
SHA256
f517c3f8313b330d30932bc4923897a6b191c941e559d412f59a1c681eabf770
-
SHA512
37e1ea2cdaa05381527a153310dfc097b2e9e22000b37a772c78811f577096da5090e5fa585bb028fc7a564dfbd77c906be06847c0250d26d3b7284e0ec762d4
-
SSDEEP
49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxr:Mxx9NUFkQx753uWuCyyxr
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ caae26b72d0960304e244c8434132840N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion caae26b72d0960304e244c8434132840N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion caae26b72d0960304e244c8434132840N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe -
Executes dropped EXE 4 IoCs
pid Process 2320 explorer.exe 2128 spoolsv.exe 2692 svchost.exe 2796 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 2304 caae26b72d0960304e244c8434132840N.exe 2320 explorer.exe 2128 spoolsv.exe 2692 svchost.exe -
resource yara_rule behavioral1/memory/2304-0-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/files/0x000900000001739b-7.dat themida behavioral1/memory/2304-10-0x0000000003670000-0x0000000003C7E000-memory.dmp themida behavioral1/memory/2320-12-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/files/0x00090000000173ee-18.dat themida behavioral1/memory/2128-24-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/files/0x0008000000017474-31.dat themida behavioral1/memory/2692-36-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2304-43-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2796-44-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2128-51-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2796-49-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2304-53-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2320-54-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2692-56-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2320-57-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2320-65-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2692-68-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2320-69-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2320-77-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/2692-78-0x0000000000400000-0x0000000000A0E000-memory.dmp themida -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA caae26b72d0960304e244c8434132840N.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2304 caae26b72d0960304e244c8434132840N.exe 2320 explorer.exe 2128 spoolsv.exe 2692 svchost.exe 2796 spoolsv.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe caae26b72d0960304e244c8434132840N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caae26b72d0960304e244c8434132840N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2884 schtasks.exe 2120 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2304 caae26b72d0960304e244c8434132840N.exe 2304 caae26b72d0960304e244c8434132840N.exe 2304 caae26b72d0960304e244c8434132840N.exe 2304 caae26b72d0960304e244c8434132840N.exe 2304 caae26b72d0960304e244c8434132840N.exe 2304 caae26b72d0960304e244c8434132840N.exe 2304 caae26b72d0960304e244c8434132840N.exe 2304 caae26b72d0960304e244c8434132840N.exe 2304 caae26b72d0960304e244c8434132840N.exe 2304 caae26b72d0960304e244c8434132840N.exe 2304 caae26b72d0960304e244c8434132840N.exe 2304 caae26b72d0960304e244c8434132840N.exe 2304 caae26b72d0960304e244c8434132840N.exe 2304 caae26b72d0960304e244c8434132840N.exe 2304 caae26b72d0960304e244c8434132840N.exe 2304 caae26b72d0960304e244c8434132840N.exe 2304 caae26b72d0960304e244c8434132840N.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2692 svchost.exe 2692 svchost.exe 2692 svchost.exe 2692 svchost.exe 2692 svchost.exe 2692 svchost.exe 2692 svchost.exe 2692 svchost.exe 2692 svchost.exe 2692 svchost.exe 2692 svchost.exe 2692 svchost.exe 2692 svchost.exe 2692 svchost.exe 2692 svchost.exe 2692 svchost.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2692 svchost.exe 2692 svchost.exe 2692 svchost.exe 2320 explorer.exe 2320 explorer.exe 2692 svchost.exe 2692 svchost.exe 2320 explorer.exe 2320 explorer.exe 2692 svchost.exe 2692 svchost.exe 2320 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2692 svchost.exe 2320 explorer.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2304 caae26b72d0960304e244c8434132840N.exe 2304 caae26b72d0960304e244c8434132840N.exe 2320 explorer.exe 2320 explorer.exe 2128 spoolsv.exe 2128 spoolsv.exe 2692 svchost.exe 2692 svchost.exe 2796 spoolsv.exe 2796 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2320 2304 caae26b72d0960304e244c8434132840N.exe 30 PID 2304 wrote to memory of 2320 2304 caae26b72d0960304e244c8434132840N.exe 30 PID 2304 wrote to memory of 2320 2304 caae26b72d0960304e244c8434132840N.exe 30 PID 2304 wrote to memory of 2320 2304 caae26b72d0960304e244c8434132840N.exe 30 PID 2320 wrote to memory of 2128 2320 explorer.exe 31 PID 2320 wrote to memory of 2128 2320 explorer.exe 31 PID 2320 wrote to memory of 2128 2320 explorer.exe 31 PID 2320 wrote to memory of 2128 2320 explorer.exe 31 PID 2128 wrote to memory of 2692 2128 spoolsv.exe 32 PID 2128 wrote to memory of 2692 2128 spoolsv.exe 32 PID 2128 wrote to memory of 2692 2128 spoolsv.exe 32 PID 2128 wrote to memory of 2692 2128 spoolsv.exe 32 PID 2692 wrote to memory of 2796 2692 svchost.exe 33 PID 2692 wrote to memory of 2796 2692 svchost.exe 33 PID 2692 wrote to memory of 2796 2692 svchost.exe 33 PID 2692 wrote to memory of 2796 2692 svchost.exe 33 PID 2320 wrote to memory of 2760 2320 explorer.exe 34 PID 2320 wrote to memory of 2760 2320 explorer.exe 34 PID 2320 wrote to memory of 2760 2320 explorer.exe 34 PID 2320 wrote to memory of 2760 2320 explorer.exe 34 PID 2692 wrote to memory of 2884 2692 svchost.exe 35 PID 2692 wrote to memory of 2884 2692 svchost.exe 35 PID 2692 wrote to memory of 2884 2692 svchost.exe 35 PID 2692 wrote to memory of 2884 2692 svchost.exe 35 PID 2692 wrote to memory of 2120 2692 svchost.exe 39 PID 2692 wrote to memory of 2120 2692 svchost.exe 39 PID 2692 wrote to memory of 2120 2692 svchost.exe 39 PID 2692 wrote to memory of 2120 2692 svchost.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\caae26b72d0960304e244c8434132840N.exe"C:\Users\Admin\AppData\Local\Temp\caae26b72d0960304e244c8434132840N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2796
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 03:00 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2884
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 03:01 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2120
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5b5ff599efd3613219eb87a7c8596b689
SHA174560bca7e785c62a10f75e55995ef55eb086b84
SHA25627ec2f14b1911f55d05c2eb5d13e0d864443f3121ee0405d9cd5e28294434106
SHA512d6e659d145084fa787f0527e547541d55745ddf23da6326eb3834cc4b5313a892caf9676b6e187be946bfe32e465cf173b7fddf78ed07879ae7ea0f750c11834
-
Filesize
2.5MB
MD57fb72eb57da5686275c6ee3abd5ec874
SHA1f58c2d12a2cd1717191843e0e1c1a34327ecc061
SHA25640e160c0b3dd7e1936fa503f880d479d3f239a959658c35e2c128dc312a79f3c
SHA512d26752d85849629e06048d0a5eeb0d807f90792b86e4ac7aed72d122321a404282c66f13a977cd71e435626f9415acefd28b773cbf2b5a224895f661ff0e589a
-
Filesize
2.5MB
MD5c98b64152a48151cda437b94c17d6715
SHA1b4a8508e5e6e35cd3bd9f0da6fa0147e371daa50
SHA256aea96e1e27e494ac1a22e11761a6d65d1e8e2546187044abc36158b1b4a9404e
SHA512956457789322a98f9d8644178877d68029df320af15c45917982fa1de11e0e0610b07e16dc1e14bc325824f7fc4a90bd6373f1347e7f57fa221b7fa7bd8a6bae