Analysis

  • max time kernel
    124s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    14-07-2020 05:52

General

  • Target

    sddssdds.exe

  • Size

    1.9MB

  • MD5

    90885f67315b5161abc99a32af0502b8

  • SHA1

    75fb52283242351d76cd593235141030a6bec495

  • SHA256

    48a02cad33e580c75623f1e5b7f31abd174cde98be1381d002e7c2ce53ea2e77

  • SHA512

    777a6101fdafd8702acb65a9609e723c5119a96967d6e943c86b76480c5e142bedf1b9e5a1b48d2d1fec82fdffa2453f0f142068923ff97213cefbbcb9dc8187

Score
9/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sddssdds.exe
    "C:\Users\Admin\AppData\Local\Temp\sddssdds.exe"
    1⤵
    • Checks BIOS information in registry
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks whether UAC is enabled
    PID:2536
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 860
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      PID:1492

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1492-0-0x0000000004CF0000-0x0000000004CF1000-memory.dmp

    Filesize

    4KB

  • memory/1492-1-0x0000000004CF0000-0x0000000004CF1000-memory.dmp

    Filesize

    4KB

  • memory/1492-3-0x0000000004CF0000-0x0000000004CF1000-memory.dmp

    Filesize

    4KB

  • memory/1492-6-0x0000000005320000-0x0000000005321000-memory.dmp

    Filesize

    4KB