Analysis

  • max time kernel
    137s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    24-09-2021 10:27

General

  • Target

    62b28222159f1b1abe80bec49c89444448c41623a93895afafb7563fe82ffdd3.exe

  • Size

    2.7MB

  • MD5

    8c9f6311f6c49a27f0d5250d76f3004b

  • SHA1

    d4efeaab6b62b7ceb35a1797ee8dfcfff10cbdd7

  • SHA256

    62b28222159f1b1abe80bec49c89444448c41623a93895afafb7563fe82ffdd3

  • SHA512

    64acfb4fd407098c200951282c985ae9670b237d18c9b91b08a04313a503e3956cfddecf6d4341dbc67887918578454ad0c014061fbec4732ebc4cdcce20c9b9

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62b28222159f1b1abe80bec49c89444448c41623a93895afafb7563fe82ffdd3.exe
    "C:\Users\Admin\AppData\Local\Temp\62b28222159f1b1abe80bec49c89444448c41623a93895afafb7563fe82ffdd3.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:1192

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1192-54-0x0000000075661000-0x0000000075663000-memory.dmp
    Filesize

    8KB

  • memory/1192-55-0x00000000011B0000-0x00000000018C5000-memory.dmp
    Filesize

    7.1MB

  • memory/1192-56-0x00000000011B1000-0x00000000011D8000-memory.dmp
    Filesize

    156KB