Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 16:17
Static task
static1
Behavioral task
behavioral1
Sample
JQXl0lEJMWhz.exe
Resource
win7-20240903-en
General
-
Target
JQXl0lEJMWhz.exe
-
Size
13.9MB
-
MD5
1aa9a0eab69a91dad1e4ddf16f3deb44
-
SHA1
a71e6952698784fc2ff931289ed6f87943360c13
-
SHA256
0ada51ccd560238a9b104ee8c26b8afe8f348fbbdfd12f067d2276e880298d8c
-
SHA512
a5682643ed9112435dd7e1ad430955c1ca4e3d2ccc11ac14bed669b556bd3618be4e02104fed2b4f2666d01b63029ad44b4c7534a8d7980e4bbb2a2765cb0415
-
SSDEEP
393216:8JzWUq3UKKeizYH2jBkzv7qZ/CMKGvZ/0ZtCHN:85W1nezCTzDAC1GxvHN
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JQXl0lEJMWhz.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JQXl0lEJMWhz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JQXl0lEJMWhz.exe -
Deletes itself 1 IoCs
pid Process 2308 ldrupd.bin -
Executes dropped EXE 1 IoCs
pid Process 2308 ldrupd.bin -
Loads dropped DLL 5 IoCs
pid Process 1880 JQXl0lEJMWhz.exe 1880 JQXl0lEJMWhz.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JQXl0lEJMWhz.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemEnvironmentPrivilege 1880 JQXl0lEJMWhz.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1880 wrote to memory of 2920 1880 JQXl0lEJMWhz.exe 30 PID 1880 wrote to memory of 2920 1880 JQXl0lEJMWhz.exe 30 PID 1880 wrote to memory of 2920 1880 JQXl0lEJMWhz.exe 30 PID 1880 wrote to memory of 2920 1880 JQXl0lEJMWhz.exe 30 PID 1880 wrote to memory of 1724 1880 JQXl0lEJMWhz.exe 31 PID 1880 wrote to memory of 1724 1880 JQXl0lEJMWhz.exe 31 PID 1880 wrote to memory of 1724 1880 JQXl0lEJMWhz.exe 31 PID 1880 wrote to memory of 1724 1880 JQXl0lEJMWhz.exe 31 PID 1880 wrote to memory of 2308 1880 JQXl0lEJMWhz.exe 32 PID 1880 wrote to memory of 2308 1880 JQXl0lEJMWhz.exe 32 PID 1880 wrote to memory of 2308 1880 JQXl0lEJMWhz.exe 32 PID 2308 wrote to memory of 2772 2308 ldrupd.bin 33 PID 2308 wrote to memory of 2772 2308 ldrupd.bin 33 PID 2308 wrote to memory of 2772 2308 ldrupd.bin 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JQXl0lEJMWhz.exe"C:\Users\Admin\AppData\Local\Temp\JQXl0lEJMWhz.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵PID:2920
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵PID:1724
-
-
C:\Users\Admin\AppData\Local\ldrupd.bin"C:\Users\Admin\AppData\Local\ldrupd.bin"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2308 -s 1003⤵
- Loads dropped DLL
PID:2772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a24978a6b77e2cd99823e24c6eb4d055
SHA105aab593ba8e0c21f2859d04d4810fdd1ce453c3
SHA25680ac94c086eb6e52bc3bbebd86e0795f6cb7476153af0c767b9ae4b7e9931140
SHA51224356ce42d0fd7839166416604fd7bd101cab8754de095676c921bfb664bc110e8a87cb863afefb5fd98450496c1b3e303851943f13a3e19f206350239c2a8db