Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 17:10
Static task
static1
Behavioral task
behavioral1
Sample
197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe
Resource
win7-20240903-en
General
-
Target
197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe
-
Size
3.2MB
-
MD5
885a317f0e6471b48210a165fa878af7
-
SHA1
0beccc1ab4baa6ae9c9a735ecc0719b75031c394
-
SHA256
197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d
-
SHA512
6e017371d637ddfd56229cc7ba2da4285b9ab3e6891d11c5b27ff784bcf5063ae1dcc65b51e1445944ae12df1d72791a485f365776ccd245b2a03bde1c05ca08
-
SSDEEP
98304:Ol2fRAinZNWMWvrcRoJfr0zVVQrY92iVzc/JFUhdM:M/iZNXWTc5zXQkfI/Ah6
Malware Config
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
Processes:
197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
Processes:
197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
Processes:
197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
Processes:
197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Wine 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wine 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe -
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\Count 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
Processes:
197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exepid process 2664 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe 2664 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe 2664 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe 2664 197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe"C:\Users\Admin\AppData\Local\Temp\197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe"1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Maps connected drives based on registry
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2664