Resubmissions
13-11-2024 19:38
241113-ycpdzsycnj 8Analysis
-
max time kernel
24s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 19:38
Static task
static1
General
-
Target
ActSet.exe
-
Size
650.0MB
-
MD5
5d154e54427fc951508fcb8225260eeb
-
SHA1
02ef7db12f07ac919823a765c35bef0a0ac777cb
-
SHA256
62c435de1dd3657a0d2203948aa79de68432ee59b632574f571211acf3520b37
-
SHA512
211a11b84aa9e64e3ea25782c4b4eb0ce48842b98262c03be1b2de705386e04e02b49ba61680e624a0216cd863cef48f3793c301825f29cb9260eeafb454ed87
-
SSDEEP
49152:CeNzxKvAI/KnCAjFN2DOjwJHJdVLD4+04p+cn0Jmc9gqSsOp4MQ+FnFrMR5:DCA34pfBGgqSsOV
Malware Config
Signatures
-
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools ActSet.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: ActSet.exe File opened (read-only) \??\F: ActSet.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 ipinfo.io 28 ipinfo.io -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN ActSet.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ActSet.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe 3884 ActSet.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ActSet.exe"C:\Users\Admin\AppData\Local\Temp\ActSet.exe"1⤵
- Looks for VMWare Tools registry key
- Enumerates connected drives
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3884