Analysis
-
max time kernel
123s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
08-10-2021 17:30
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume2/Program Files/VMware/tools/lib/vmaxsvc.exe
Resource
win7-en-20210920
0 signatures
0 seconds
General
-
Target
Device/HarddiskVolume2/Program Files/VMware/tools/lib/vmaxsvc.exe
-
Size
17.1MB
-
MD5
383d6a55625a81ead08705003a6ac105
-
SHA1
ade79797e95eb9487a272530e9e17f2181e81a45
-
SHA256
e8b73d39c58fef2b571505bdd69e371c8ff095541528c7bcbbf4120e024a19bb
-
SHA512
31d1d32d1fdc030a336d6f85a7111ae690f0f740f1a0a9683193faf0e13686d72ae5fb4e6963a57972ec19c9f195b4bab2453b80e25e07ab2da26f5a95bda394
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\International\Geo\Nation vmaxsvc.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString vmaxsvc.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\16 vmaxsvc.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\1 vmaxsvc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString vmaxsvc.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\2 vmaxsvc.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\0 vmaxsvc.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1116 vmaxsvc.exe 1116 vmaxsvc.exe 1116 vmaxsvc.exe 1116 vmaxsvc.exe 1116 vmaxsvc.exe 1116 vmaxsvc.exe 1116 vmaxsvc.exe 608 vmaxsvc.exe 608 vmaxsvc.exe 608 vmaxsvc.exe 608 vmaxsvc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1116 vmaxsvc.exe Token: SeDebugPrivilege 1116 vmaxsvc.exe Token: SeTakeOwnershipPrivilege 608 vmaxsvc.exe Token: SeTcbPrivilege 608 vmaxsvc.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1116 vmaxsvc.exe 1116 vmaxsvc.exe 1116 vmaxsvc.exe 1116 vmaxsvc.exe 608 vmaxsvc.exe 608 vmaxsvc.exe 608 vmaxsvc.exe 608 vmaxsvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume2\Program Files\VMware\tools\lib\vmaxsvc.exe"C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume2\Program Files\VMware\tools\lib\vmaxsvc.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume2\Program Files\VMware\tools\lib\vmaxsvc.exe"C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume2\Program Files\VMware\tools\lib\vmaxsvc.exe" -run_agent -second2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:608
-