Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 04:16

General

  • Target

    f445e496a05f3d45920d225dd1532c98b93b53c62358778bd68453d2c6eba877N.exe

  • Size

    5.3MB

  • MD5

    3e9a3c0f1e01f004e0ff669257afcd80

  • SHA1

    9226820ebee217d76d358268269f22ad969a8f41

  • SHA256

    f445e496a05f3d45920d225dd1532c98b93b53c62358778bd68453d2c6eba877

  • SHA512

    f431d419f08bf3818d5252706da42dc734f3a2586f3090bacc217d25668cac0eea09124348d8bae349a656db3f951d5a262387e8b9062903faf059e72a617bb2

  • SSDEEP

    98304:Fl6tTOYLPmZN3bo62tapuG4+fbHv15GG+plNDu/dKHqOC6:utTOKOZZ32wpuG4WbaXU/dKHJX

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Themida packer 7 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f445e496a05f3d45920d225dd1532c98b93b53c62358778bd68453d2c6eba877N.exe
    "C:\Users\Admin\AppData\Local\Temp\f445e496a05f3d45920d225dd1532c98b93b53c62358778bd68453d2c6eba877N.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Windows\system32\cmd.exe
      cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\f445e496a05f3d45920d225dd1532c98b93b53c62358778bd68453d2c6eba877N.exe"
      2⤵
      • Deletes itself
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:3028
      • C:\Windows\system32\PING.EXE
        ping 1.1.1.1 -n 1 -w 3000
        3⤵
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:1792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2900-0-0x000000013F450000-0x00000001401E5000-memory.dmp

    Filesize

    13.6MB

  • memory/2900-1-0x0000000077A40000-0x0000000077A42000-memory.dmp

    Filesize

    8KB

  • memory/2900-2-0x000000013F450000-0x00000001401E5000-memory.dmp

    Filesize

    13.6MB

  • memory/2900-5-0x000000013F450000-0x00000001401E5000-memory.dmp

    Filesize

    13.6MB

  • memory/2900-4-0x000000013F450000-0x00000001401E5000-memory.dmp

    Filesize

    13.6MB

  • memory/2900-3-0x000000013F450000-0x00000001401E5000-memory.dmp

    Filesize

    13.6MB

  • memory/2900-6-0x000000013F450000-0x00000001401E5000-memory.dmp

    Filesize

    13.6MB

  • memory/2900-22-0x000000013F450000-0x00000001401E5000-memory.dmp

    Filesize

    13.6MB