Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 00:17

General

  • Target

    75707ae37316328f661e00cf9c813def7a0a3aef1b017b4a326032bf7d60a325.exe

  • Size

    2.5MB

  • MD5

    1032aa0f426642fc4b4d4dd97c2524b1

  • SHA1

    c436fe6edf2190ad194851c53a2092a60483a184

  • SHA256

    75707ae37316328f661e00cf9c813def7a0a3aef1b017b4a326032bf7d60a325

  • SHA512

    409f94180cc5bc161a47676b78d18ea51be4babb568efbcac445cb1a885fb2b8d02d326e713da14c6875e88057f40166de7470f0bc59a150ef02a1ea96d75362

  • SSDEEP

    49152:XxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxL:Xxx9NUFkQx753uWuCyyxL

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Themida packer 18 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75707ae37316328f661e00cf9c813def7a0a3aef1b017b4a326032bf7d60a325.exe
    "C:\Users\Admin\AppData\Local\Temp\75707ae37316328f661e00cf9c813def7a0a3aef1b017b4a326032bf7d60a325.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3192
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3052
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5064
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in System32 directory
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2064
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:4080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    2.5MB

    MD5

    67b56b9b1ceba2b99c556cff4901bcc4

    SHA1

    54b98eba29e5ca792ae38c34e3ef911cffe9ac79

    SHA256

    07513df6c3dd45a25ba38e3fbaf551b1607cc0f2d205428cd0b77ecb732c3547

    SHA512

    adf4fa5bd6d2cea3d50e6455628ee0da223b4cf3824a3bc9a03bbe7f88f410496623b30a3f46af6c9eb346cc1c5062c25d03d25b1455b75ef25a13e679215696

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    2.5MB

    MD5

    7a6fee1940cb854bc9381297576d1e2e

    SHA1

    96b127fdd37405bb088982fb964e4dcc3a2e7cac

    SHA256

    9160d1c672bc5970c2a6560060f2abb878076502edfd17bdc292aea4fe4ca113

    SHA512

    bf5c22ae7a219f795e213511b6c20730fbe9cfe9700c81c5341d17d43f304f738f7c9124997041ef6aeb40503112364fcc6433f0a548a8d32252084aa35eb5ce

  • C:\Windows\Resources\svchost.exe

    Filesize

    2.5MB

    MD5

    6852dc213a26a35128c38099ff2e1270

    SHA1

    c25481bd2f5ccf2d0d1686cb831c96b356ef995d

    SHA256

    0ce0228a6fb48ce4e4bf7885a8b5193fa61cc698fc6917a951ad1fcf88a1634e

    SHA512

    c1010de16f2cf2e86ae70448eeaa2c407df3d18681cb87c64dda635c78dceb2678355069f29828cb27ab9f646467cd36ef073ae2896f3a5e4c5e6646df5b7395

  • memory/2064-56-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/2064-45-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/2064-28-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/3052-43-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/3052-10-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/3052-53-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/3052-55-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/3052-57-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/3052-67-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/3192-42-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/3192-0-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/3192-1-0x0000000077164000-0x0000000077166000-memory.dmp

    Filesize

    8KB

  • memory/4080-33-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/4080-38-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/5064-19-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/5064-41-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB