Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 01:19
Behavioral task
behavioral1
Sample
57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe
Resource
win7-20240903-en
2 signatures
150 seconds
General
-
Target
57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe
-
Size
7.2MB
-
MD5
457dd50bacbba4f78904f181efd41134
-
SHA1
57cfa261b96350b6df8f9fbbb5dea6f89070cdee
-
SHA256
dfec243df01b464fd44852649101704c9bae21a4fd52b6e35f3c85617d0a6775
-
SHA512
aaa5e3dfa0580d2fb6832d4f6b36479039361a766e1079a750c6693b260d12acf0f4f4c8863a8c34034059ad16c1718d12b2f9fa804c326b38f9858e2acbd889
-
SSDEEP
98304:xPw1hknRFTHU6a9zKU3PP+hlx8g9F5Nt5I4HC/8lp4yjFU:x41AnK3P2hr/8mCk74y
Malware Config
Signatures
-
Enumerates VirtualBox DLL files 2 TTPs 10 IoCs
Processes:
57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exedescription ioc process File opened (read-only) \??\c:\windows\SysWOW64\vboxoglerrorspu.dll 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe File opened (read-only) \??\c:\windows\SysWOW64\vboxoglfeedbackspu.dll 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe File opened (read-only) \??\c:\windows\SysWOW64\vboxhook.dll 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe File opened (read-only) \??\c:\windows\SysWOW64\vboxmrxnp.dll 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe File opened (read-only) \??\c:\windows\SysWOW64\vboxoglcrutil.dll 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe File opened (read-only) \??\c:\windows\SysWOW64\vboxoglpackspu.dll 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe File opened (read-only) \??\c:\windows\SysWOW64\vboxoglpassthroughspu.dll 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe File opened (read-only) \??\c:\windows\SysWOW64\vboxdisp.dll 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe File opened (read-only) \??\c:\windows\SysWOW64\vboxogl.dll 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe File opened (read-only) \??\c:\windows\SysWOW64\vboxoglarrayspu.dll 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe -
Looks for Parallels drivers on disk. 2 TTPs 6 IoCs
Processes:
57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exedescription ioc process File opened (read-only) \??\c:\windows\SysWOW64\drivers\prltime.sys 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe File opened (read-only) \??\c:\windows\SysWOW64\drivers\prl_pv32.sys 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe File opened (read-only) \??\c:\windows\SysWOW64\drivers\prleth.sys 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe File opened (read-only) \??\c:\windows\SysWOW64\drivers\prlfs.sys 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe File opened (read-only) \??\c:\windows\SysWOW64\drivers\prlmouse.sys 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe File opened (read-only) \??\c:\windows\SysWOW64\drivers\prlvideo.sys 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe -
Looks for VirtualBox drivers on disk 2 TTPs 4 IoCs
Processes:
57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exedescription ioc process File opened (read-only) \??\c:\windows\SysWOW64\drivers\VBoxMouse.sys 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe File opened (read-only) \??\c:\windows\SysWOW64\drivers\VBoxGuest.sys 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe File opened (read-only) \??\c:\windows\SysWOW64\drivers\VBoxSF.sys 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe File opened (read-only) \??\c:\windows\SysWOW64\drivers\VBoxVideo.sys 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe -
Looks for VirtualBox executables on disk 2 TTPs 3 IoCs
Processes:
57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exedescription ioc process File opened (read-only) \??\c:\windows\SysWOW64\vboxservice.exe 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe File opened (read-only) \??\c:\windows\SysWOW64\vboxtray.exe 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe File opened (read-only) \??\c:\windows\SysWOW64\VBoxControl.exe 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe -
Looks for VMWare drivers on disk 2 TTPs 2 IoCs
Processes:
57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exedescription ioc process File opened (read-only) \??\c:\windows\SysWOW64\drivers\vmmouse.sys 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe File opened (read-only) \??\c:\windows\SysWOW64\drivers\vmhgfs.sys 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe -
Processes:
resource yara_rule behavioral2/memory/220-0-0x0000000000FE0000-0x0000000001712000-memory.dmp upx behavioral2/memory/220-1-0x0000000000FE0000-0x0000000001712000-memory.dmp upx behavioral2/memory/220-2-0x0000000000FE0000-0x0000000001712000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe"C:\Users\Admin\AppData\Local\Temp\57cfa261b96350b6df8f9fbbb5dea6f89070cdee.exe"1⤵
- Enumerates VirtualBox DLL files
- Looks for Parallels drivers on disk.
- Looks for VirtualBox drivers on disk
- Looks for VirtualBox executables on disk
- Looks for VMWare drivers on disk
- System Location Discovery: System Language Discovery
PID:220