Analysis

  • max time kernel
    900s
  • max time network
    900s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    16/01/2025, 13:33

General

  • Target

    Malware-1-master/mo332.exe

  • Size

    14.0MB

  • MD5

    552326e3f16df1857e7918a569dcca50

  • SHA1

    3a3fd7027c65c75b3e8930535b27e29b4681814c

  • SHA256

    f5d20a2ef757dd374b1651a955a80113b33b87578e3484fd3589565d296d55cc

  • SHA512

    a3d00cc28de8131484ebe29d1addfc9e27c9e782a6ec07bee2a19c88ee3afe0f867f8c0c933b6a83946266d46606483d87c8d57b5679cafeeae09eeae1ba41f3

  • SSDEEP

    196608:OSfbf3vp28hgy4ohRID4CUAq52Zdm4nKJJmbmChthPtbSttLPSwYJQ:ffT3XhgQRI8C82ZP+MblGttLSpJQ

Malware Config

Signatures

  • UAC bypass 3 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Malware-1-master\mo332.exe
    "C:\Users\Admin\AppData\Local\Temp\Malware-1-master\mo332.exe"
    1⤵
    • UAC bypass
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1144
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Windows\tzjyatct\xdnrxvywni.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3092
      • C:\Windows\tzjyatct\xdnrxvywni.exe
        C:\Windows\tzjyatct\xdnrxvywni.exe
        3⤵
        • UAC bypass
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:3572
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "C:\Windows\PLA\userplus.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1360
          • C:\Windows\PLA\userplus.exe
            C:\Windows\PLA\userplus.exe
            5⤵
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:3412
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Malware-1-master\mokill.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Malware-1-master\Config.ini

    Filesize

    1KB

    MD5

    2db7a58f4892054c7077dab88fd68b86

    SHA1

    acf198a9160a872bc8633fc9185ad317e69bf2a4

    SHA256

    01701b302ab45f11729fac64ba33cd7b53abbc94963578d9813a1f5848e75618

    SHA512

    01926e211445f72f6637f7be04af33339f4acd78b3d2e8f4b6b4e0c28ea6c2662ea0aec976cc8a4f875ab1d12ca20eec7ebf59fe3704f76dc4adac3a0766511c

  • C:\Users\Admin\AppData\Local\Temp\Malware-1-master\mokill.bat

    Filesize

    233B

    MD5

    d0d780da4a079ec4b25ea31cbe7fafff

    SHA1

    55010d852ff80dc34dac1f6bb606d6b0693f9ce2

    SHA256

    2b5053f22f1696811156f544b57813b671d079c85e2c081691a1e9ee343eadc1

    SHA512

    3e65cc88a0445250fe58203e0a85e1801f469d308a03579e1fd4f4c8184f090c505f5da6744895975a9efdaf56dec2eaa66dff43f5132228e980d0ff7e6c56d9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-556537508-2730415644-482548075-1000\3310a4fa6cb9c60504498d7eea986fc2_dd844bc0-09d5-4996-aa38-4ceeb7107a86

    Filesize

    50B

    MD5

    45218adff3ea5bde8a8f61987f0f458b

    SHA1

    cf7fffa410795cc2f7703755f0acd17b51a44ad7

    SHA256

    f95361b82464704675f559b13c007c9567e5914984042f537122383e747194d4

    SHA512

    8442cac48931075ec5bd31ea82faffc4f64d7b6845d5c477d06fc3d7eefeac1fa366b6880a85709a520a343b5dd3771e69bc4b7482cde50e69e04215927a2018

  • C:\Windows\PLA\userplus.exe

    Filesize

    2.3MB

    MD5

    336cd9b9a8f4ce243c889407bcdcfa21

    SHA1

    4acf0664e7df5c87f9387bc7243b57050d7ce143

    SHA256

    c17d51aac55953b4ca8b3d8c4725528e1eef8f53ac78bd9bdda512daeb1cc3da

    SHA512

    033dd5bf02801ad34e6ea9b5571e9af74f5dc9e0aaf3b9f958a3052b0a579581da857269ddba3dd74f53e251dbcad396fba35ae5b4ae2d72e6e481b6eaa79fd0

  • C:\Windows\System32\NlsLexicons00mmx.dll

    Filesize

    100KB

    MD5

    ca43974f638606af7259397a344e0434

    SHA1

    02b7cf6e2a7fd77f619e27c7584180a950aa7fe8

    SHA256

    4f394c128557a3f05c817aae8ddd005e2f462b298b858b1d49277fe574ce6752

    SHA512

    ab986229c156f1404895983399c64513cc13be3083309b9b61413024922fbf3322e203184e19bb5090c78b813a28362d345a1cb229e61e67d91dd803512a4786

  • C:\Windows\system32\NlsLexicons00ssx.dll

    Filesize

    67KB

    MD5

    b1a562ae50903a943e6e0884a7c3aa28

    SHA1

    57fcd5de222c7f99bd82372056127841fbc80e6e

    SHA256

    8402155eb3a3fb0fdc7ce7bbea87e8a59d81ae03e46d5d2ff041663d7051d3fc

    SHA512

    a1b7bcce916e80c2cf83029471f665bb0dfe411341c1817a0a3b0bdc758f24a45676b2b000890578320cbb6c4457ed23535188cff2d7fddcacedebcd8a414dab

  • C:\Windows\tzjyatct\conf.ini

    Filesize

    4KB

    MD5

    61830234ea9c313c27d2891f333328f9

    SHA1

    95cc2252ea481dc7d54838cd67e35e387bc8eb79

    SHA256

    984f780ecbc97d108c0591f10acfb64866de14024626f07467d6c2d5156ed881

    SHA512

    dcce834d90c3fc9d25a5d2727d54e669b65629ffc84fc15b6fadac1b2534cd32d8b006afc086748b2a5d430ddfa95494561c5b2e7bd8d1ff3620e56fccebb921

  • C:\Windows\tzjyatct\conf.ini

    Filesize

    4KB

    MD5

    c685dc1895bf128edc1c815ddc8d245b

    SHA1

    7d55c48b38844385ab3134bc60a88c4ba619b4bb

    SHA256

    083d4167ddbdcaddb02d6445447ec5604c5cab3ed39b105780287913aa553417

    SHA512

    ca9afa2c8b0fb9573dcb3d15e4d09890fcba0b5808de36309783436fb7d8303f95776dfc30930bc4993defb955e5c83e322f3a934351dd73434edb33a7717751

  • C:\Windows\tzjyatct\xdnrxvywni.exe

    Filesize

    6.7MB

    MD5

    9f1facb9f7dd07342a07b0856c5b48f2

    SHA1

    44a23fe809534a90b31ac0c290aee432edc542c2

    SHA256

    afbfdbfdda5fd42a6b4ea7b37f7222651e5461d8138355b9b233eba26766fa58

    SHA512

    868371102c2f4559b5316d85ce6ce197ad60566c9ea81c47707e57b64c5c2c5a18615d9918fee1fc1250996b86ba0a375bfa896f0b3145e9d451de046256745f

  • memory/1144-267-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-249-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-26-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-25-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-20-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-2-0x0000000000051000-0x000000000006D000-memory.dmp

    Filesize

    112KB

  • memory/1144-1-0x00000000777F6000-0x00000000777F8000-memory.dmp

    Filesize

    8KB

  • memory/1144-184-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-287-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-281-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-278-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-273-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-270-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-219-0x00000000059C0000-0x00000000059C1000-memory.dmp

    Filesize

    4KB

  • memory/1144-264-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-261-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-258-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-0-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-253-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-37-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-246-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-202-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-243-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-240-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-237-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-232-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-229-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-208-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-226-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-210-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-223-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-212-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-213-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-220-0x00000000059B0000-0x00000000059B1000-memory.dmp

    Filesize

    4KB

  • memory/1144-215-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-216-0x0000000000050000-0x0000000001114000-memory.dmp

    Filesize

    16.8MB

  • memory/1144-221-0x0000000005970000-0x0000000005971000-memory.dmp

    Filesize

    4KB

  • memory/3412-257-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-245-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-217-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-291-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-222-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-211-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-182-0x00007FFB6F390000-0x00007FFB6F3A0000-memory.dmp

    Filesize

    64KB

  • memory/3412-225-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-280-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-277-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-228-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-207-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-272-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-231-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-269-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-266-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-236-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-263-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-260-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-239-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-252-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-248-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3412-242-0x00007FF6D4800000-0x00007FF6D4E4B000-memory.dmp

    Filesize

    6.3MB

  • memory/3572-250-0x0000000005C80000-0x0000000005C81000-memory.dmp

    Filesize

    4KB

  • memory/3572-188-0x0000000005CC0000-0x0000000005CC1000-memory.dmp

    Filesize

    4KB

  • memory/3572-203-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-201-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-247-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-241-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-200-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-218-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-251-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-204-0x0000000005D00000-0x0000000005D01000-memory.dmp

    Filesize

    4KB

  • memory/3572-195-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-254-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-185-0x0000000005CD0000-0x0000000005CD1000-memory.dmp

    Filesize

    4KB

  • memory/3572-186-0x0000000005D30000-0x0000000005D31000-memory.dmp

    Filesize

    4KB

  • memory/3572-259-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-238-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-187-0x0000000005D20000-0x0000000005D22000-memory.dmp

    Filesize

    8KB

  • memory/3572-262-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-205-0x0000000005C50000-0x0000000005C51000-memory.dmp

    Filesize

    4KB

  • memory/3572-244-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-265-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-233-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-189-0x0000000005C90000-0x0000000005C91000-memory.dmp

    Filesize

    4KB

  • memory/3572-268-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-206-0x0000000005C30000-0x0000000005C31000-memory.dmp

    Filesize

    4KB

  • memory/3572-190-0x0000000005CE0000-0x0000000005CE2000-memory.dmp

    Filesize

    8KB

  • memory/3572-271-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-230-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-191-0x0000000005D10000-0x0000000005D11000-memory.dmp

    Filesize

    4KB

  • memory/3572-274-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-227-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-192-0x0000000005C20000-0x0000000005C21000-memory.dmp

    Filesize

    4KB

  • memory/3572-279-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-209-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-193-0x0000000005D40000-0x0000000005D41000-memory.dmp

    Filesize

    4KB

  • memory/3572-282-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-194-0x0000000000F91000-0x0000000000FB9000-memory.dmp

    Filesize

    160KB

  • memory/3572-224-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-214-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB

  • memory/3572-292-0x0000000000F90000-0x0000000001946000-memory.dmp

    Filesize

    9.7MB