Resubmissions

21/09/2024, 14:30

240921-rvgzaswhqf 9

21/09/2024, 12:49

240921-p2r2qssgme 9

Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 14:30

General

  • Target

    paint.exe

  • Size

    4.3MB

  • MD5

    91f58c76697f964e359844b460980bff

  • SHA1

    d943bbf58b25f3bd49393044ba02b8a0bd9c5cd5

  • SHA256

    335182fb927d6ce2bbe800b35997d7e0e6010ce388434c65355c11353b0116f2

  • SHA512

    1af656c10d97d652eccfd01c1d84fccf02e6a59219b7f611987f5241d53e98ed5f44d785609491075f992273ed0359cd56fe1101da3b5596bdb9ceb3d1bc9868

  • SSDEEP

    98304:OfWMn/85jV8kbave4qaI6d3WonyEQ+us76D+iLdkCWdFv:yYkeeI6d3Wy57mLnCFv

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 32 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\paint.exe
    "C:\Users\Admin\AppData\Local\Temp\paint.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2012
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1520
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4348
    • C:\Users\Admin\AppData\Local\Temp\paint.exe
      "C:\Users\Admin\AppData\Local\Temp\paint.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of AdjustPrivilegeToken
      PID:1008

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1008-23-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/1008-32-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/1008-30-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/1008-29-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/1008-28-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/1008-27-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/1008-26-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/1008-24-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/1008-25-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/1520-11-0x000002295A0F0000-0x000002295A0F1000-memory.dmp

      Filesize

      4KB

    • memory/1520-9-0x000002295A0F0000-0x000002295A0F1000-memory.dmp

      Filesize

      4KB

    • memory/1520-10-0x000002295A0F0000-0x000002295A0F1000-memory.dmp

      Filesize

      4KB

    • memory/1520-21-0x000002295A0F0000-0x000002295A0F1000-memory.dmp

      Filesize

      4KB

    • memory/1520-20-0x000002295A0F0000-0x000002295A0F1000-memory.dmp

      Filesize

      4KB

    • memory/1520-19-0x000002295A0F0000-0x000002295A0F1000-memory.dmp

      Filesize

      4KB

    • memory/1520-18-0x000002295A0F0000-0x000002295A0F1000-memory.dmp

      Filesize

      4KB

    • memory/1520-17-0x000002295A0F0000-0x000002295A0F1000-memory.dmp

      Filesize

      4KB

    • memory/1520-16-0x000002295A0F0000-0x000002295A0F1000-memory.dmp

      Filesize

      4KB

    • memory/1520-15-0x000002295A0F0000-0x000002295A0F1000-memory.dmp

      Filesize

      4KB

    • memory/2012-2-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-34-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-8-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-7-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-6-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-5-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-4-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-1-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-3-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-0-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-33-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-22-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-35-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-36-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-37-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-39-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-40-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-41-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-42-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-43-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-44-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-45-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB

    • memory/2012-46-0x00007FF75BAD0000-0x00007FF75C623000-memory.dmp

      Filesize

      11.3MB