Analysis

  • max time kernel
    133s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:10

General

  • Target

    4b5d342b8c5a5b19fac86b1315802786.exe

  • Size

    8.7MB

  • MD5

    4b5d342b8c5a5b19fac86b1315802786

  • SHA1

    3566b77ecc01ef67839e91b542dab05434167495

  • SHA256

    865dc3b296ef4745577ad148b1ce7f9e812a32b8d020a09bd783fbd067750467

  • SHA512

    f74e6d947d3a3cad43a0c4b40bc33e7b3961cb3857fac18c139b686c75015d4ea5d7410fb5a833676e5d04c0d41b34cec9f618fb42cf52d75c36fe435f22ce32

  • SSDEEP

    196608:jxSZrxSZExSZfU+2at3DS7sJav43YmOZdqUJ9quict4Z6Xfs6:jxSZrxSZExSZfU+2aJDSgJnmqukY4ZoZ

Score
9/10

Malware Config

Signatures

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b5d342b8c5a5b19fac86b1315802786.exe
    "C:\Users\Admin\AppData\Local\Temp\4b5d342b8c5a5b19fac86b1315802786.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Checks computer location settings
    • Maps connected drives based on registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5496
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4b5d342b8c5a5b19fac86b1315802786.exe.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4456
      • C:\Windows\system32\timeout.exe
        timeout /t 1 /nobreak
        3⤵
        • Delays execution with timeout.exe
        PID:4616
      • C:\Users\Admin\AppData\Local\Temp\4b5d342b8c5a5b19fac86b1315802786.exe
        "C:\Users\Admin\AppData\Local\Temp\4b5d342b8c5a5b19fac86b1315802786.exe" relaunch
        3⤵
          PID:4796

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\4b5d342b8c5a5b19fac86b1315802786.exe.log

      Filesize

      1KB

      MD5

      5cb90c90e96a3b36461ed44d339d02e5

      SHA1

      5508281a22cca7757bc4fbdb0a8e885c9f596a04

      SHA256

      34c15d8e79fef4bddec7e34f3426df3b68f8fc6deac29ea12d110f6c529fe3bb

      SHA512

      63735938c841c28824e3482559df18839930acc5ea8600b1074439b70a2f600a92f41593568e49991f25f079e7f7361b4f1678feadbf004f6e9e4d51d36598d4

    • C:\Users\Admin\AppData\Local\Temp\4b5d342b8c5a5b19fac86b1315802786.exe.bat

      Filesize

      399B

      MD5

      1b6dd772d96cbffb8917c2c5feddeaca

      SHA1

      ee5d99ca7912720e1c4496833f1e9084b27091f3

      SHA256

      4cfd99a5af42bde2be7a4482eaa6e3c89fc41e0afb4fced39896045b3200faf2

      SHA512

      75afbaa98d204430158ed6dd271e6719846a1279a8ec59f98b3ddf61a9bf95d4782fcd93a28e9a6155213c8844823e958e321ef88c27b5032b545230f76dff94

    • C:\Users\Admin\AppData\Local\Temp\4b5d342b8c5a5b19fac86b1315802786.exe.tmp

      Filesize

      8.8MB

      MD5

      3a2b7ba14dd1400fc570d3ef33bd7973

      SHA1

      9117bab1c10a44149889148b2e86b4fd70b46f5a

      SHA256

      4b9f9ac38392e52ec48d38c437d4c59d507bab34bfb48f65d858a110efdb8973

      SHA512

      3f7c7170fc0e66be958fd979580166c99d3119a9b6406b3ec62a72e45127f5509103647654469850567e306f6217a20a4006781b1c8d057d235ef19ef4623499

    • memory/4796-21-0x00007FFE76F70000-0x00007FFE77A31000-memory.dmp

      Filesize

      10.8MB

    • memory/4796-20-0x000001D086300000-0x000001D086314000-memory.dmp

      Filesize

      80KB

    • memory/4796-19-0x00007FFE76F70000-0x00007FFE77A31000-memory.dmp

      Filesize

      10.8MB

    • memory/5496-4-0x0000017B7CFE0000-0x0000017B7D3B6000-memory.dmp

      Filesize

      3.8MB

    • memory/5496-7-0x00007FFE76F70000-0x00007FFE77A31000-memory.dmp

      Filesize

      10.8MB

    • memory/5496-8-0x00007FFE76F70000-0x00007FFE77A31000-memory.dmp

      Filesize

      10.8MB

    • memory/5496-9-0x00007FFE76F70000-0x00007FFE77A31000-memory.dmp

      Filesize

      10.8MB

    • memory/5496-6-0x00007FFE76F70000-0x00007FFE77A31000-memory.dmp

      Filesize

      10.8MB

    • memory/5496-16-0x00007FFE76F70000-0x00007FFE77A31000-memory.dmp

      Filesize

      10.8MB

    • memory/5496-5-0x00007FFE76F70000-0x00007FFE77A31000-memory.dmp

      Filesize

      10.8MB

    • memory/5496-0-0x00007FFE76F73000-0x00007FFE76F75000-memory.dmp

      Filesize

      8KB

    • memory/5496-3-0x0000017B7AAA0000-0x0000017B7AAB4000-memory.dmp

      Filesize

      80KB

    • memory/5496-2-0x0000017B7CE90000-0x0000017B7CFDE000-memory.dmp

      Filesize

      1.3MB

    • memory/5496-1-0x0000017B79FD0000-0x0000017B7A6E0000-memory.dmp

      Filesize

      7.1MB