Analysis

  • max time kernel
    144s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 17:09

General

  • Target

    file.exe

  • Size

    2.3MB

  • MD5

    1d5451b6204c0a4cff11890174a4dbbe

  • SHA1

    f375940bbcdf0b479d2c94571e63b9edeaa004b5

  • SHA256

    802c7e9495a7c8a7ce0fca8ba353ddf64f15a0558a74ff68b27a0e7adb1ab159

  • SHA512

    e5f383dfc1ca6483354e24fac752562e3d677698242c5ed1afa0cc80f63ba7d6bfffff992436fae4ef87eb27704ffc21d42b672c60948eab43f7b9120e225626

  • SSDEEP

    49152:kcLO8IueYNiWE7w7XXHiFPfVK76tjzYk6LnKIsJHgAHUndnVSOc7J:kcL5hNp7XXEtanDoV5HUnVVZU

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies system certificate store 2 TTPs 16 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\blfoiykk.exe"
      2⤵
        PID:2348
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\elphvufv.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1732
        • C:\Users\Admin\AppData\Local\Temp\elphvufv.exe
          "C:\Users\Admin\AppData\Local\Temp\elphvufv.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1880
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\qsnnseug & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\elphvufv.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2324
            • C:\Windows\SysWOW64\timeout.exe
              timeout 2
              5⤵
              • Delays execution with timeout.exe
              PID:2284
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\qsnnseug & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\elphvufv.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:240
            • C:\Windows\SysWOW64\timeout.exe
              timeout 2
              5⤵
              • Delays execution with timeout.exe
              PID:2756
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\cprrdsobe.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Users\Admin\AppData\Local\Temp\cprrdsobe.exe
          "C:\Users\Admin\AppData\Local\Temp\cprrdsobe.exe"
          3⤵
          • Checks BIOS information in registry
          • Drops startup file
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2984
          • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
            "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
            4⤵
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Suspicious behavior: AddClipboardFormatListener
            PID:2676
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\fbuktibgu.vbs"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2400
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fbuktibgu.vbs"
          3⤵
          • Blocklisted process makes network request
          • Modifies system certificate store
          PID:1044

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Defense Evasion

    Virtualization/Sandbox Evasion

    2
    T1497

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Modify Registry

    1
    T1112

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Discovery

    Query Registry

    5
    T1012

    Virtualization/Sandbox Evasion

    2
    T1497

    System Information Discovery

    3
    T1082

    Collection

    Data from Local System

    1
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\qsnnseug\46173476.txt
      Filesize

      44B

      MD5

      12b8a12369f75b6730280ecb67e06188

      SHA1

      50d395d8c84a34e9d07156af71f2fbc65fb9502c

      SHA256

      c3802b964bdde3e6afba6c7cd9645c79146f1e940c85b2b394af1b84381873d0

      SHA512

      5ab464f056bfb87c19e76586f23cdc0d5b34767d02ae2a8813db62fe5963bf6f2f9b9411c41e85a268eb16a421c0df7721352c1bea3d073f4ba5eee89c47d3f1

    • C:\ProgramData\qsnnseug\8372422.txt
      Filesize

      156B

      MD5

      b5089e0c5a3d5377e9bd19c0557ef04e

      SHA1

      9402e326be3d240e234c06892b15c24e93c93eb8

      SHA256

      d77789b2c49759c882f4fdd6f53e665b0d012f8f0949d0150eaba47fbf2a0eb5

      SHA512

      942349ccb99854f274ef1e20b623660588e15bd0d25bfc817fe9b2d010db656af340652e0e67b41edbf0cf259d55ab880d6b50acb1d7e8ab394f1393f7956c13

    • C:\ProgramData\qsnnseug\Files\_INFOR~1.TXT
      Filesize

      111B

      MD5

      0d3a2818c3aa801f294519398c9cb1b4

      SHA1

      71624c4da08bba2c731888cd0743416922c448d8

      SHA256

      7de479d2848c70cbc2b1b045851573e554ee1abfbb6146e6d0768ddd3a235ae7

      SHA512

      3e483e2b9df8dbb5ee6d345a7ed0f2e9c92729de3c74b5b6ba310fd5f935b587f7e53221055417cc19e859e9105429c71646e78be0eae9c006980e9397f16864

    • C:\ProgramData\qsnnseug\GB_202~1.ZIP
      Filesize

      258B

      MD5

      05afaaba4cb3d6caae6ad1edd884fde6

      SHA1

      02a56c63b99ede48999b96c79341e95fe0ee8fd1

      SHA256

      7a447d1b0939aedf9c45ba757b7b40250700455e36c18f6c4af6b25fa38a20a9

      SHA512

      334ddc57835164653be2332a7ea9200f176e12b3e4d85b0aee75de42ccf511afc9bf6081c5246af5630ec1bd6308a3b60599c30bf1fdc7851698ea8b3a6ec92c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      680aaf6061e5f37802c0ffa9095e4f04

      SHA1

      ffa9d1e30c18c769fb3115be54f19ee5dec8871a

      SHA256

      5166b82ff7abd83dc6a30c981f67fc047b9ed54239d47ddcb73986539b261c3d

      SHA512

      9e20443da34a0fc18c31771283944a51a38b81d30a88acfc3f78afe21e7be39a677b450a5c033f1c9f3e2612de512fd44b3c00ce54a7704205d985240ed5e726

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a5501d83d141007c61ae058bb5caaf43

      SHA1

      678846c6fd2b8b2a08533ca042cbe722de83ad8f

      SHA256

      322c13c7ed3ce79919df24c43a57bc4de2b034e5fc7b6079fb440404fb2a4883

      SHA512

      e17a098161d29495647ddcb30104e412daf8263401ff29d8bb3b769b39e846cc3b91f8a635d6a753fb05023bef6e734deedc9724bd36f627a9fb4d1725746c52

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ecd10739e183757af3d2fb390745f45c

      SHA1

      b3d0703deea48c96ad2ebe0d73b3b23e84bdae07

      SHA256

      dbb4f4c0e89a7fd8d71771439381feaf5f2d7dcf6452676ebea92c1574656329

      SHA512

      2ad29cce6c9e1c343d3f07497030e2cfadcf6c51f4d656b1134b662fe873eccee01f2a3a9bb0730bd9e408f4a9ccae6006ed7011483be56a99ce05a9c2688c2c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      0ed67bbee9648d73a6cea6ef8db97b08

      SHA1

      5256bcafa9a038a0b4e81a4134f34b24350bba1b

      SHA256

      388eaacf4ae21496b2a3675300ee32c24dbc2a2b2836d13dc5329d9c5ab9be4d

      SHA512

      d54609d3481b9a33b1ab6414f38b71918aaff5a3570dd51ad7339b7e4d2e2e271569a1e5e353c5212927e6cb9954ac269156ce7008b979d8ec9bfefe2a07e810

    • C:\Users\Admin\AppData\Local\Temp\Cab7DC9.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar81A7.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\fbuktibgu.vbs
      Filesize

      148B

      MD5

      4e3ca291d5121708572c815607a044b4

      SHA1

      67bda1541813965d8d770d310efbb179cbe1c2fe

      SHA256

      fd4d1805195cae665676574fceb199f01a093e2de8df7e02db75c756b54b8142

      SHA512

      21684dd9f42914549fdf48fd142b0a9707eec203f083d31f437f9090001f703ef045ef76a784e89193305948f95e4c926017fb6030e5174d67ffa2f4990f49df

    • \Users\Admin\AppData\Local\Temp\cprrdsobe.exe
      Filesize

      2.7MB

      MD5

      a4370362a9e4a76731652138df7305dd

      SHA1

      75cada3b14ac062d723146adca3f8cefdbb075e5

      SHA256

      b49fe3670551020b4d28f8ad6c4271e19a8d0b83ae2bf47fe40643a749f29dba

      SHA512

      fe83c0c8df44cedcc29b99c5b5f0d145a0026844c6f5f536caa986169e2c4dbcc5ee3d1571bbbaa0e8953c2e2d9140a0c948d70fee30d3db5fe6177375bd824d

    • \Users\Admin\AppData\Local\Temp\elphvufv.exe
      Filesize

      1.7MB

      MD5

      93d471d1d3bb5260ef5c547a67d97231

      SHA1

      464937ea7052d10f4c0f04a5d3a9ff10dff7fcdd

      SHA256

      70720bfd26ae21f7df6fb235f802d766db27fa104f5e7b42bbb24a6a808d034e

      SHA512

      850a0deae8a4d3f3b7213a0218142a499e8fdf9f75f2195b5d61b1119e6d1d78933d7d596d49dd0da65431c04861c92ef31ab2132d90a2c7fe586c4d7ddfde49

    • memory/1732-251-0x0000000001CE0000-0x0000000002156000-memory.dmp
      Filesize

      4.5MB

    • memory/1880-258-0x0000000000A80000-0x0000000000EF6000-memory.dmp
      Filesize

      4.5MB

    • memory/1880-425-0x0000000000FF0000-0x0000000001466000-memory.dmp
      Filesize

      4.5MB

    • memory/1880-259-0x0000000000A80000-0x0000000000EF6000-memory.dmp
      Filesize

      4.5MB

    • memory/1880-256-0x0000000000FF0000-0x0000000001466000-memory.dmp
      Filesize

      4.5MB

    • memory/1880-257-0x0000000000A80000-0x0000000000EF6000-memory.dmp
      Filesize

      4.5MB

    • memory/1928-427-0x0000000000890000-0x00000000011F3000-memory.dmp
      Filesize

      9.4MB

    • memory/1928-3-0x0000000000890000-0x00000000011F3000-memory.dmp
      Filesize

      9.4MB

    • memory/1928-8-0x0000000000890000-0x00000000011F3000-memory.dmp
      Filesize

      9.4MB

    • memory/1928-268-0x0000000000890000-0x00000000011F3000-memory.dmp
      Filesize

      9.4MB

    • memory/1928-7-0x0000000000890000-0x00000000011F3000-memory.dmp
      Filesize

      9.4MB

    • memory/1928-26-0x0000000000890000-0x00000000011F3000-memory.dmp
      Filesize

      9.4MB

    • memory/1928-0-0x0000000000890000-0x00000000011F3000-memory.dmp
      Filesize

      9.4MB

    • memory/1928-1-0x000000007EBD0000-0x000000007EFA1000-memory.dmp
      Filesize

      3.8MB

    • memory/1928-2-0x0000000000890000-0x00000000011F3000-memory.dmp
      Filesize

      9.4MB

    • memory/1928-6-0x0000000000890000-0x00000000011F3000-memory.dmp
      Filesize

      9.4MB

    • memory/1928-5-0x000000007EBD0000-0x000000007EFA1000-memory.dmp
      Filesize

      3.8MB

    • memory/1928-4-0x0000000000890000-0x00000000011F3000-memory.dmp
      Filesize

      9.4MB

    • memory/2348-37-0x00000000021B0000-0x00000000021B1000-memory.dmp
      Filesize

      4KB

    • memory/2676-429-0x000000013FFD0000-0x0000000140643000-memory.dmp
      Filesize

      6.4MB

    • memory/2676-321-0x000000013FFD0000-0x0000000140643000-memory.dmp
      Filesize

      6.4MB

    • memory/2676-428-0x000000013FFD0000-0x0000000140643000-memory.dmp
      Filesize

      6.4MB

    • memory/2676-431-0x000000013FFD0000-0x0000000140643000-memory.dmp
      Filesize

      6.4MB

    • memory/2676-432-0x000000013FFD0000-0x0000000140643000-memory.dmp
      Filesize

      6.4MB

    • memory/2676-433-0x000000013FFD0000-0x0000000140643000-memory.dmp
      Filesize

      6.4MB

    • memory/2676-434-0x000000013FFD0000-0x0000000140643000-memory.dmp
      Filesize

      6.4MB

    • memory/2676-435-0x000000013FFD0000-0x0000000140643000-memory.dmp
      Filesize

      6.4MB

    • memory/2984-320-0x000000013FFD0000-0x0000000140643000-memory.dmp
      Filesize

      6.4MB

    • memory/2984-318-0x000000013F310000-0x000000013F983000-memory.dmp
      Filesize

      6.4MB

    • memory/2984-306-0x000000013F210000-0x000000013F220000-memory.dmp
      Filesize

      64KB

    • memory/2984-270-0x000000013F310000-0x000000013F983000-memory.dmp
      Filesize

      6.4MB

    • memory/2984-430-0x000000013FFD0000-0x0000000140643000-memory.dmp
      Filesize

      6.4MB