Resubmissions
23-10-2021 13:49
211023-q4pj3acda6 927-09-2021 16:25
210927-tw86aahecn 1027-09-2021 16:15
210927-tp7c4shebk 1025-09-2021 21:37
210925-1glj1adhh7 924-09-2021 00:57
210924-bbd6asfdgj 1024-09-2021 00:56
210924-bad4xafdfr 9Analysis
-
max time kernel
64s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
25-09-2021 21:37
Static task
static1
Behavioral task
behavioral1
Sample
APP.exe
Resource
win11
windows11_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
APP.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
APP.exe
-
Size
5.2MB
-
MD5
a0b4d2c96937104bcffd21ce69885a59
-
SHA1
6cda6e2bee6d67a5f407e4d7e96af9d76bfa7c79
-
SHA256
72cb50e5791e1fcb11d24bc4cff3b44379a529c5549fbf6f500adcd67bfe9139
-
SHA512
17b1b4de1bddb7f357744ace07509481e80eb8a63fa9c39ee00ecd7eba3b03611eb0e2329e88e20b05e8a2655fa67a7b699c8455c1fa9aebeba4384151ae2ee0
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion APP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion APP.exe -
resource yara_rule behavioral2/memory/640-114-0x0000000001090000-0x0000000001D6B000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA APP.exe