Analysis
-
max time kernel
97s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
Jx28O9tTOa5vND40.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Jx28O9tTOa5vND40.exe
Resource
win10v2004-20240802-en
General
-
Target
Jx28O9tTOa5vND40.exe
-
Size
1.4MB
-
MD5
714716b8dd3ab20a00c5276b1b7901f9
-
SHA1
d7fc773a6aedb7ae5c97b88db72e8bfe68819e42
-
SHA256
23d4b4933b776f8c3da20951bd0f5e2c4a1a3be9af8686bc8f8571a94df96f32
-
SHA512
498bbc52ad5c875d53621e55086484dfffc65ea71300521a92ffac6e7228e8962f84dd7b687e09e5a804fccb01b94f7de9682ef68b0b0b30b14cd10d2fb5d6fa
-
SSDEEP
24576:PSXx8UUb9hwRqVE4ICWC/PzZZ20e/wlZfwCuFAKOazcBUvub+ndVtuo0lW:PSCj/OquNCW+9ZZe4DwCkAnUg+nde7W
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions Jx28O9tTOa5vND40.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Jx28O9tTOa5vND40.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Jx28O9tTOa5vND40.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2232 Jx28O9tTOa5vND40.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN Jx28O9tTOa5vND40.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe 2232 Jx28O9tTOa5vND40.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2232 wrote to memory of 4796 2232 Jx28O9tTOa5vND40.exe 83 PID 2232 wrote to memory of 4796 2232 Jx28O9tTOa5vND40.exe 83 PID 4796 wrote to memory of 688 4796 cmd.exe 84 PID 4796 wrote to memory of 688 4796 cmd.exe 84 PID 4796 wrote to memory of 2268 4796 cmd.exe 85 PID 4796 wrote to memory of 2268 4796 cmd.exe 85 PID 4796 wrote to memory of 692 4796 cmd.exe 86 PID 4796 wrote to memory of 692 4796 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Jx28O9tTOa5vND40.exe"C:\Users\Admin\AppData\Local\Temp\Jx28O9tTOa5vND40.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Jx28O9tTOa5vND40.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Jx28O9tTOa5vND40.exe" MD53⤵PID:688
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2268
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:692
-
-