Analysis
-
max time kernel
131s -
max time network
72s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
28-05-2020 12:16
Static task
static1
Behavioral task
behavioral1
Sample
apphost1.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
General
-
Target
apphost1.exe
-
Size
2.8MB
-
MD5
19dbfa49c5ecc6054420a62f7fd890d6
-
SHA1
8a1aeb1445917ae186ff09932085b18564d08187
-
SHA256
608097b33943a9a4b14bee255680724f2fe830474766fe6462ccfffaefd517cf
-
SHA512
5bd992dbfdbe4faf922cef59aed28a37cfa111ac6cc568ac881a6288520e34353ba30a399096f10b1c93d80ec51de382976103b676a4f32a86343c101cdb7b21
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
apphost1.exepid process 1736 apphost1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 2736 WerFault.exe Token: SeBackupPrivilege 2736 WerFault.exe Token: SeDebugPrivilege 2736 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe -
Processes:
resource yara_rule behavioral2/memory/2736-2-0x0000000004FF0000-0x0000000004FF1000-memory.dmp vmprotect -
Processes:
apphost1.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA apphost1.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
apphost1.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ apphost1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Loads dropped DLL 1 IoCs
Processes:
apphost1.exepid process 1736 apphost1.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2736 1736 WerFault.exe apphost1.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
apphost1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion apphost1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion apphost1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\apphost1.exe"C:\Users\Admin\AppData\Local\Temp\apphost1.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks whether UAC is enabled
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Loads dropped DLL
- Checks BIOS information in registry
PID:1736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 18482⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Program crash
PID:2736
-