Analysis

  • max time kernel
    151s
  • max time network
    10s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    11-08-2020 14:14

General

  • Target

    Death_Shadow.exe

  • Size

    3.9MB

  • MD5

    09fe55d6c6ff0d8c81ed802179969092

  • SHA1

    0d4765083e945aae4e57f0bf720fbca79878456e

  • SHA256

    6c7ee3d9bdb647382946f854a517b72a5ddf6d4804fd2fa75a84619c8548d121

  • SHA512

    40c572139ad0935b71e4d52ea9f6a80e909db18ae1443e93f9c665a80ee6bef4a89919ec041e4f787d470aa78aa96132aef13413ddc6bf6718751cf9d6c05449

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Death_Shadow.exe
    "C:\Users\Admin\AppData\Local\Temp\Death_Shadow.exe"
    1⤵
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1480

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\719004af-6757-4904-824d-f3f3c3ab51cd\AgileDotNetRT.dll
  • memory/1480-0-0x0000000073990000-0x000000007407E000-memory.dmp
    Filesize

    6.9MB

  • memory/1480-1-0x0000000000B30000-0x0000000000B31000-memory.dmp
    Filesize

    4KB

  • memory/1480-4-0x00000000075C0000-0x00000000075D1000-memory.dmp
    Filesize

    68KB

  • memory/1480-5-0x00000000079D0000-0x00000000079E1000-memory.dmp
    Filesize

    68KB