Resubmissions

17-01-2025 20:14

250117-yz7h3s1qfw 10

17-01-2025 20:12

250117-yy9l2sslcr 10

17-01-2025 17:25

250117-vy9p9sxpez 10

17-01-2025 17:21

250117-vw8eesyjfp 10

17-01-2025 14:16

250117-rk9ass1rhk 10

17-01-2025 14:12

250117-rhv1ds1lds 10

16-01-2025 12:52

250116-p4et7a1mez 10

16-01-2025 12:50

250116-p29xjssjep 10

Analysis

  • max time kernel
    900s
  • max time network
    450s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    16-01-2025 12:50

General

  • Target

    Malware-1-master/mo332.exe

  • Size

    14.0MB

  • MD5

    552326e3f16df1857e7918a569dcca50

  • SHA1

    3a3fd7027c65c75b3e8930535b27e29b4681814c

  • SHA256

    f5d20a2ef757dd374b1651a955a80113b33b87578e3484fd3589565d296d55cc

  • SHA512

    a3d00cc28de8131484ebe29d1addfc9e27c9e782a6ec07bee2a19c88ee3afe0f867f8c0c933b6a83946266d46606483d87c8d57b5679cafeeae09eeae1ba41f3

  • SSDEEP

    196608:OSfbf3vp28hgy4ohRID4CUAq52Zdm4nKJJmbmChthPtbSttLPSwYJQ:ffT3XhgQRI8C82ZP+MblGttLSpJQ

Malware Config

Signatures

  • UAC bypass 3 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Malware-1-master\mo332.exe
    "C:\Users\Admin\AppData\Local\Temp\Malware-1-master\mo332.exe"
    1⤵
    • UAC bypass
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:340
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Windows\obuzanle\qgqupnsjzz.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3180
      • C:\Windows\obuzanle\qgqupnsjzz.exe
        C:\Windows\obuzanle\qgqupnsjzz.exe
        3⤵
        • UAC bypass
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:3428
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "C:\Windows\PLA\userplus.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1792
          • C:\Windows\PLA\userplus.exe
            C:\Windows\PLA\userplus.exe
            5⤵
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:3488
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 1888
          4⤵
          • Program crash
          PID:2240
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Malware-1-master\mokill.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1092
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3428 -ip 3428
    1⤵
      PID:2724

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Malware-1-master\Config.ini

      Filesize

      1KB

      MD5

      2db7a58f4892054c7077dab88fd68b86

      SHA1

      acf198a9160a872bc8633fc9185ad317e69bf2a4

      SHA256

      01701b302ab45f11729fac64ba33cd7b53abbc94963578d9813a1f5848e75618

      SHA512

      01926e211445f72f6637f7be04af33339f4acd78b3d2e8f4b6b4e0c28ea6c2662ea0aec976cc8a4f875ab1d12ca20eec7ebf59fe3704f76dc4adac3a0766511c

    • C:\Users\Admin\AppData\Local\Temp\Malware-1-master\mokill.bat

      Filesize

      233B

      MD5

      d0d780da4a079ec4b25ea31cbe7fafff

      SHA1

      55010d852ff80dc34dac1f6bb606d6b0693f9ce2

      SHA256

      2b5053f22f1696811156f544b57813b671d079c85e2c081691a1e9ee343eadc1

      SHA512

      3e65cc88a0445250fe58203e0a85e1801f469d308a03579e1fd4f4c8184f090c505f5da6744895975a9efdaf56dec2eaa66dff43f5132228e980d0ff7e6c56d9

    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2499603254-3415597248-1508446358-1000\3310a4fa6cb9c60504498d7eea986fc2_8c9ee1bc-5364-4b37-aae7-4f6a9eeffa14

      Filesize

      50B

      MD5

      45218adff3ea5bde8a8f61987f0f458b

      SHA1

      cf7fffa410795cc2f7703755f0acd17b51a44ad7

      SHA256

      f95361b82464704675f559b13c007c9567e5914984042f537122383e747194d4

      SHA512

      8442cac48931075ec5bd31ea82faffc4f64d7b6845d5c477d06fc3d7eefeac1fa366b6880a85709a520a343b5dd3771e69bc4b7482cde50e69e04215927a2018

    • C:\Windows\PLA\userplus.exe

      Filesize

      2.3MB

      MD5

      336cd9b9a8f4ce243c889407bcdcfa21

      SHA1

      4acf0664e7df5c87f9387bc7243b57050d7ce143

      SHA256

      c17d51aac55953b4ca8b3d8c4725528e1eef8f53ac78bd9bdda512daeb1cc3da

      SHA512

      033dd5bf02801ad34e6ea9b5571e9af74f5dc9e0aaf3b9f958a3052b0a579581da857269ddba3dd74f53e251dbcad396fba35ae5b4ae2d72e6e481b6eaa79fd0

    • C:\Windows\obuzanle\conf.ini

      Filesize

      4KB

      MD5

      61830234ea9c313c27d2891f333328f9

      SHA1

      95cc2252ea481dc7d54838cd67e35e387bc8eb79

      SHA256

      984f780ecbc97d108c0591f10acfb64866de14024626f07467d6c2d5156ed881

      SHA512

      dcce834d90c3fc9d25a5d2727d54e669b65629ffc84fc15b6fadac1b2534cd32d8b006afc086748b2a5d430ddfa95494561c5b2e7bd8d1ff3620e56fccebb921

    • C:\Windows\obuzanle\conf.ini

      Filesize

      4KB

      MD5

      c685dc1895bf128edc1c815ddc8d245b

      SHA1

      7d55c48b38844385ab3134bc60a88c4ba619b4bb

      SHA256

      083d4167ddbdcaddb02d6445447ec5604c5cab3ed39b105780287913aa553417

      SHA512

      ca9afa2c8b0fb9573dcb3d15e4d09890fcba0b5808de36309783436fb7d8303f95776dfc30930bc4993defb955e5c83e322f3a934351dd73434edb33a7717751

    • C:\Windows\obuzanle\qgqupnsjzz.exe

      Filesize

      6.7MB

      MD5

      9f1facb9f7dd07342a07b0856c5b48f2

      SHA1

      44a23fe809534a90b31ac0c290aee432edc542c2

      SHA256

      afbfdbfdda5fd42a6b4ea7b37f7222651e5461d8138355b9b233eba26766fa58

      SHA512

      868371102c2f4559b5316d85ce6ce197ad60566c9ea81c47707e57b64c5c2c5a18615d9918fee1fc1250996b86ba0a375bfa896f0b3145e9d451de046256745f

    • C:\Windows\system32\NlsLexicons00mmx.dll

      Filesize

      100KB

      MD5

      ca43974f638606af7259397a344e0434

      SHA1

      02b7cf6e2a7fd77f619e27c7584180a950aa7fe8

      SHA256

      4f394c128557a3f05c817aae8ddd005e2f462b298b858b1d49277fe574ce6752

      SHA512

      ab986229c156f1404895983399c64513cc13be3083309b9b61413024922fbf3322e203184e19bb5090c78b813a28362d345a1cb229e61e67d91dd803512a4786

    • C:\Windows\system32\NlsLexicons00ssx.dll

      Filesize

      67KB

      MD5

      b1a562ae50903a943e6e0884a7c3aa28

      SHA1

      57fcd5de222c7f99bd82372056127841fbc80e6e

      SHA256

      8402155eb3a3fb0fdc7ce7bbea87e8a59d81ae03e46d5d2ff041663d7051d3fc

      SHA512

      a1b7bcce916e80c2cf83029471f665bb0dfe411341c1817a0a3b0bdc758f24a45676b2b000890578320cbb6c4457ed23535188cff2d7fddcacedebcd8a414dab

    • memory/340-238-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-0-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-268-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-260-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-258-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-256-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-254-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-252-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-250-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-242-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-240-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-214-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-40-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-41-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-27-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-42-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-236-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-273-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-234-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-56-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-26-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-232-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-22-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-228-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-226-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-224-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-222-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-6-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-220-0x0000000000220000-0x00000000012E4000-memory.dmp

      Filesize

      16.8MB

    • memory/340-218-0x0000000005B90000-0x0000000005B91000-memory.dmp

      Filesize

      4KB

    • memory/340-2-0x0000000000221000-0x000000000023D000-memory.dmp

      Filesize

      112KB

    • memory/340-1-0x00000000774B6000-0x00000000774B8000-memory.dmp

      Filesize

      8KB

    • memory/340-219-0x0000000005B50000-0x0000000005B51000-memory.dmp

      Filesize

      4KB

    • memory/340-217-0x0000000005BA0000-0x0000000005BA1000-memory.dmp

      Filesize

      4KB

    • memory/3428-52-0x0000000005740000-0x0000000005741000-memory.dmp

      Filesize

      4KB

    • memory/3428-39-0x00000000007F0000-0x00000000011A6000-memory.dmp

      Filesize

      9.7MB

    • memory/3428-38-0x00000000007F1000-0x0000000000819000-memory.dmp

      Filesize

      160KB

    • memory/3428-37-0x00000000057D0000-0x00000000057D1000-memory.dmp

      Filesize

      4KB

    • memory/3428-36-0x0000000005750000-0x0000000005751000-memory.dmp

      Filesize

      4KB

    • memory/3428-202-0x00000000056C0000-0x00000000056C1000-memory.dmp

      Filesize

      4KB

    • memory/3428-35-0x00000000056B0000-0x00000000056B1000-memory.dmp

      Filesize

      4KB

    • memory/3428-203-0x00000000056F0000-0x00000000056F1000-memory.dmp

      Filesize

      4KB

    • memory/3428-34-0x00000000057A0000-0x00000000057A1000-memory.dmp

      Filesize

      4KB

    • memory/3428-197-0x00000000056A0000-0x00000000056A1000-memory.dmp

      Filesize

      4KB

    • memory/3428-33-0x0000000005770000-0x0000000005772000-memory.dmp

      Filesize

      8KB

    • memory/3428-198-0x00000000056D0000-0x00000000056D1000-memory.dmp

      Filesize

      4KB

    • memory/3428-32-0x0000000005720000-0x0000000005721000-memory.dmp

      Filesize

      4KB

    • memory/3428-196-0x00000000007F0000-0x00000000011A6000-memory.dmp

      Filesize

      9.7MB

    • memory/3428-213-0x00000000007F0000-0x00000000011A6000-memory.dmp

      Filesize

      9.7MB

    • memory/3428-195-0x00000000007F0000-0x00000000011A6000-memory.dmp

      Filesize

      9.7MB

    • memory/3428-31-0x00000000057B0000-0x00000000057B2000-memory.dmp

      Filesize

      8KB

    • memory/3428-60-0x0000000005690000-0x0000000005691000-memory.dmp

      Filesize

      4KB

    • memory/3428-30-0x00000000057C0000-0x00000000057C1000-memory.dmp

      Filesize

      4KB

    • memory/3428-50-0x00000000056E0000-0x00000000056E1000-memory.dmp

      Filesize

      4KB

    • memory/3428-29-0x0000000005760000-0x0000000005761000-memory.dmp

      Filesize

      4KB

    • memory/3428-51-0x0000000005780000-0x0000000005781000-memory.dmp

      Filesize

      4KB

    • memory/3428-28-0x0000000005790000-0x0000000005791000-memory.dmp

      Filesize

      4KB

    • memory/3488-253-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-215-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-237-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-241-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-235-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-249-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-233-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-251-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-231-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-227-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-225-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-255-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-223-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-257-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-221-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-259-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-204-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-267-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-209-0x00007FFDBF090000-0x00007FFDBF0A0000-memory.dmp

      Filesize

      64KB

    • memory/3488-269-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-216-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-239-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-277-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-278-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-279-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-280-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-287-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-288-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-289-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-290-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-291-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-292-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-299-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-300-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-301-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-302-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-303-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-304-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-311-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-312-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-313-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB

    • memory/3488-314-0x00007FF776150000-0x00007FF77679B000-memory.dmp

      Filesize

      6.3MB