Analysis

  • max time kernel
    142s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2024 01:25

General

  • Target

    DowloadX.exe

  • Size

    2.0MB

  • MD5

    c24b993d6ac519ab2ddf590710ddbb13

  • SHA1

    8e0629da1cbaf775b28682732bea82458c3f4e1c

  • SHA256

    0da0ce6849d2c36b47b6d2977926eeeed2175738e81efafd0e741119dfc40e69

  • SHA512

    124abad84c76795a516b3c5dca47d65bae45fff8a0e3a9401d2d4ee394f79ff5cc2897a7ff2305bcb87a90f2c609cc0a982467edb30b22adc4d2e2e5bc702ecd

  • SSDEEP

    49152:C3KvQkszfZZg2+ey/BZoz4AbR+quBeWaNHhot3iFxQ:C6sNl+pBZWVyBeWapm+xQ

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DowloadX.exe
    "C:\Users\Admin\AppData\Local\Temp\DowloadX.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    PID:1744

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8972.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1744-18-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1744-2-0x0000000008EC0000-0x0000000008EC1000-memory.dmp
    Filesize

    4KB

  • memory/1744-3-0x0000000000E70000-0x0000000000E71000-memory.dmp
    Filesize

    4KB

  • memory/1744-19-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1744-6-0x0000000008E80000-0x0000000008E81000-memory.dmp
    Filesize

    4KB

  • memory/1744-5-0x0000000008F00000-0x0000000008F01000-memory.dmp
    Filesize

    4KB

  • memory/1744-13-0x0000000008E90000-0x0000000008E91000-memory.dmp
    Filesize

    4KB

  • memory/1744-12-0x0000000008ED0000-0x0000000008ED1000-memory.dmp
    Filesize

    4KB

  • memory/1744-11-0x0000000008E60000-0x0000000008E61000-memory.dmp
    Filesize

    4KB

  • memory/1744-10-0x0000000008DF0000-0x0000000008DF1000-memory.dmp
    Filesize

    4KB

  • memory/1744-9-0x0000000008E70000-0x0000000008E71000-memory.dmp
    Filesize

    4KB

  • memory/1744-8-0x0000000008EE0000-0x0000000008EE1000-memory.dmp
    Filesize

    4KB

  • memory/1744-7-0x0000000008EB0000-0x0000000008EB1000-memory.dmp
    Filesize

    4KB

  • memory/1744-15-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1744-16-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1744-17-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1744-92-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1744-4-0x0000000008EF0000-0x0000000008EF1000-memory.dmp
    Filesize

    4KB

  • memory/1744-14-0x0000000000401000-0x000000000045D000-memory.dmp
    Filesize

    368KB

  • memory/1744-1-0x0000000077650000-0x0000000077652000-memory.dmp
    Filesize

    8KB

  • memory/1744-72-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1744-73-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1744-74-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1744-75-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1744-76-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1744-77-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1744-78-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1744-79-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1744-83-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1744-84-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1744-85-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1744-86-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1744-91-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1744-0-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB

  • memory/1744-93-0x0000000000400000-0x0000000000902000-memory.dmp
    Filesize

    5.0MB