Analysis
-
max time kernel
128s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
08-10-2021 17:30
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume2/Program Files/VMware/tools/lib/vmaxsvc.exe
Resource
win7-en-20210920
0 signatures
0 seconds
General
-
Target
Device/HarddiskVolume2/Program Files/VMware/tools/lib/vmaxsvc.exe
-
Size
17.1MB
-
MD5
383d6a55625a81ead08705003a6ac105
-
SHA1
ade79797e95eb9487a272530e9e17f2181e81a45
-
SHA256
e8b73d39c58fef2b571505bdd69e371c8ff095541528c7bcbbf4120e024a19bb
-
SHA512
31d1d32d1fdc030a336d6f85a7111ae690f0f740f1a0a9683193faf0e13686d72ae5fb4e6963a57972ec19c9f195b4bab2453b80e25e07ab2da26f5a95bda394
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation vmaxsvc.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString vmaxsvc.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\2 vmaxsvc.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\0 vmaxsvc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString vmaxsvc.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\16 vmaxsvc.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\1 vmaxsvc.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 vmaxsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@C:\Windows\SysWOW64\FirewallControlPanel.dll,-12122 = "Windows Firewall" vmaxsvc.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4796 vmaxsvc.exe 4796 vmaxsvc.exe 4796 vmaxsvc.exe 4796 vmaxsvc.exe 4796 vmaxsvc.exe 4796 vmaxsvc.exe 4796 vmaxsvc.exe 4796 vmaxsvc.exe 4796 vmaxsvc.exe 4796 vmaxsvc.exe 3900 vmaxsvc.exe 3900 vmaxsvc.exe 3900 vmaxsvc.exe 3900 vmaxsvc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4796 vmaxsvc.exe Token: SeDebugPrivilege 4796 vmaxsvc.exe Token: SeTakeOwnershipPrivilege 3900 vmaxsvc.exe Token: SeTcbPrivilege 3900 vmaxsvc.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4796 vmaxsvc.exe 4796 vmaxsvc.exe 4796 vmaxsvc.exe 4796 vmaxsvc.exe 3900 vmaxsvc.exe 3900 vmaxsvc.exe 3900 vmaxsvc.exe 3900 vmaxsvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume2\Program Files\VMware\tools\lib\vmaxsvc.exe"C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume2\Program Files\VMware\tools\lib\vmaxsvc.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume2\Program Files\VMware\tools\lib\vmaxsvc.exe"C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume2\Program Files\VMware\tools\lib\vmaxsvc.exe" -run_agent -second2⤵
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3900
-