Overview
overview
10Static
static
3ac39195bc9...c7.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3DowloadX.exe
windows10-2004-x64
9Download.exe
windows10-2004-x64
10ipras.vbs
windows10-2004-x64
8Analysis
-
max time kernel
140s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2025, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
ac39195bc9a3f97ab72f608ba7e86c79b9de337862e290d7d00ba5e0aaf23ac7.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral7
Sample
DowloadX.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral8
Sample
Download.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral9
Sample
ipras.vbs
Resource
win10v2004-20250410-en
General
-
Target
DowloadX.exe
-
Size
2.1MB
-
MD5
e6964640c38b37d47d1af6f62d84293d
-
SHA1
5fb66c1612d6931f5b9411ac697225812783b18b
-
SHA256
ae93c138b8c1e7b3af5853244f1bd81d723b4bdd487caf00fb47e308d324798e
-
SHA512
8178e081f63d403702c117b8b6bbf46f437e11d553e7ac0fa4a65e7bbd73a8d3a4026799283edfaf4c7b78d0ffbbd30f69ede60af8306238643d65fd86d89e99
-
SSDEEP
49152:hNGj8GrEoUj035sC1b70Z84xBUMDn6MOSKxYhMTJA3xanaVY3x/nWf/0:PWEoUjfC17341vBiJ2anfhnWH0
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DowloadX.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DowloadX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DowloadX.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000\Control Panel\International\Geo\Nation DowloadX.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000\Software\Wine DowloadX.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 12 bitbucket.org 13 bitbucket.org 43 bitbucket.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5560 DowloadX.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DowloadX.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5560 DowloadX.exe 5560 DowloadX.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DowloadX.exe"C:\Users\Admin\AppData\Local\Temp\DowloadX.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5560
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD550821ebf182fa181c4b10518f65a52f1
SHA144f19079d6a9b80a131e02fb0ba9978ca5a60751
SHA25646cb8940f7144e99d0ebe79d27b3194fc357fd5b5b2d83bfccd3e4cbbfdce4eb
SHA5124f93d1f4aeec6d47ab388f36c9aee961bca6a7297bb672d0da3dab47f7f449969b62de28763d90fabc4a6d5d5a7bd04fd98875a37d03129db9ee32ec163767b8
-
Filesize
15KB
MD5b703df2603ff79f25545727352d60db0
SHA161602da53ac444d76ec9061086dd651f439f27a7
SHA2569b6dcef4ca677a8fc78247b409987756e79588e847592ed5c56717e8b0bf4561
SHA512c04fdde05ab5288b28573a04d559bea4a81398cd3891d2d5cccadb276a5b22e84426a39c57ff65bd9ab6d761aa42a84cbf1940ed80c258fb9c9def42bd770ac8