Analysis

  • max time kernel
    41s
  • max time network
    44s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2024, 18:47

General

  • Target

    nwEU6IKjU1Kn.exe

  • Size

    14.3MB

  • MD5

    f6f37022aa02f7920bb2922b7166e569

  • SHA1

    775f671492b4332b745fa931944c6655b07a6e51

  • SHA256

    dd6c7714b695eb1a6e16aa5e385920a061fca1534ec84012038274f87410c4b3

  • SHA512

    75f1295cc054fde4d455d689746fa8c49b98680b992c0a22a493ed62ef4d1fee0b4fe6ccc0a86a3ac59217d383086a2d2918b0dcaec0c73a88480fc96c683bee

  • SSDEEP

    393216:AM+wSvBVMRNEe5khbrHQmNJPCtqwZukp8znc:AM+3BiNEVtHvgqTkpmc

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\nwEU6IKjU1Kn.exe
    "C:\Users\Admin\AppData\Local\Temp\nwEU6IKjU1Kn.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe"
      2⤵
        PID:456
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\SysWOW64\cmd.exe"
        2⤵
          PID:1052
        • C:\Users\Admin\AppData\Local\ldrupd.bin
          "C:\Users\Admin\AppData\Local\ldrupd.bin"
          2⤵
          • Checks computer location settings
          • Deletes itself
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4164
          • C:\Users\Admin\AppData\Local\Temp\nwEU6IKjU1Kn.exe
            "C:\Users\Admin\AppData\Local\Temp\nwEU6IKjU1Kn.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1020
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\SysWOW64\cmd.exe"
              4⤵
                PID:4100
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\SysWOW64\cmd.exe"
                4⤵
                  PID:1992

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nwEU6IKjU1Kn.exe

            Filesize

            16.2MB

            MD5

            892c372206311a3867f66753b5e0674a

            SHA1

            5603338f29010166bc4a7bdffa0167f40d72f1fd

            SHA256

            fdd34d4ee9776ada42d9b4ba2363e2062c8bdefa45089f7b2c89fed3be57395d

            SHA512

            e731f47123a676f83e197bf8cc262a0775b3bba739345845d0a249a76ab602e7c22189d5e03ab37564bdf3e6558c63ab1dbd67436024ae0273d0b97f64d2cc94

          • C:\Users\Admin\AppData\Local\ldrupd.bin

            Filesize

            3KB

            MD5

            a24978a6b77e2cd99823e24c6eb4d055

            SHA1

            05aab593ba8e0c21f2859d04d4810fdd1ce453c3

            SHA256

            80ac94c086eb6e52bc3bbebd86e0795f6cb7476153af0c767b9ae4b7e9931140

            SHA512

            24356ce42d0fd7839166416604fd7bd101cab8754de095676c921bfb664bc110e8a87cb863afefb5fd98450496c1b3e303851943f13a3e19f206350239c2a8db

          • memory/1020-22-0x0000000140000000-0x0000000142343000-memory.dmp

            Filesize

            35.3MB

          • memory/1020-19-0x0000000140000000-0x0000000142343000-memory.dmp

            Filesize

            35.3MB

          • memory/1020-566-0x0000000140000000-0x0000000142343000-memory.dmp

            Filesize

            35.3MB

          • memory/1020-562-0x0000000140000000-0x0000000142343000-memory.dmp

            Filesize

            35.3MB

          • memory/1020-23-0x0000000002520000-0x0000000002521000-memory.dmp

            Filesize

            4KB

          • memory/1020-21-0x0000000140000000-0x0000000142343000-memory.dmp

            Filesize

            35.3MB

          • memory/1020-20-0x0000000140000000-0x0000000142343000-memory.dmp

            Filesize

            35.3MB

          • memory/2276-2-0x0000000140000000-0x0000000142343000-memory.dmp

            Filesize

            35.3MB

          • memory/2276-1-0x0000000140000000-0x0000000142343000-memory.dmp

            Filesize

            35.3MB

          • memory/2276-10-0x0000000140000000-0x0000000142343000-memory.dmp

            Filesize

            35.3MB

          • memory/2276-0-0x0000000140000000-0x0000000142343000-memory.dmp

            Filesize

            35.3MB

          • memory/2276-3-0x0000000140000000-0x0000000142343000-memory.dmp

            Filesize

            35.3MB

          • memory/2276-5-0x0000000140000000-0x0000000142343000-memory.dmp

            Filesize

            35.3MB

          • memory/2276-4-0x0000000140000000-0x0000000142343000-memory.dmp

            Filesize

            35.3MB