Analysis
-
max time kernel
124s -
max time network
147s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
14-07-2020 05:52
Static task
static1
Behavioral task
behavioral1
Sample
sddssdds.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
sddssdds.exe
-
Size
1.9MB
-
MD5
90885f67315b5161abc99a32af0502b8
-
SHA1
75fb52283242351d76cd593235141030a6bec495
-
SHA256
48a02cad33e580c75623f1e5b7f31abd174cde98be1381d002e7c2ce53ea2e77
-
SHA512
777a6101fdafd8702acb65a9609e723c5119a96967d6e943c86b76480c5e142bedf1b9e5a1b48d2d1fec82fdffa2453f0f142068923ff97213cefbbcb9dc8187
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sddssdds.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sddssdds.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sddssdds.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2536 sddssdds.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1492 2536 WerFault.exe 67 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1492 WerFault.exe Token: SeBackupPrivilege 1492 WerFault.exe Token: SeDebugPrivilege 1492 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sddssdds.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sddssdds.exe"C:\Users\Admin\AppData\Local\Temp\sddssdds.exe"1⤵
- Checks BIOS information in registry
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks whether UAC is enabled
PID:2536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 8602⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1492
-