Resubmissions
21-11-2021 07:19
211121-h5vhpsgfc2 1020-11-2021 20:40
211120-zgal3adbhn 1020-11-2021 20:36
211120-zdsy8sdbhm 10Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
20-11-2021 20:40
Static task
static1
Behavioral task
behavioral1
Sample
Paladin.exe
Resource
win7-en-20211014
0 signatures
0 seconds
General
-
Target
Paladin.exe
-
Size
9.5MB
-
MD5
60fb5bcf43d7462fba8a16edde2c9524
-
SHA1
4118779194de403e1b7baf9d5a1dc43ee48130dc
-
SHA256
86ef1a5f70b1f18a40f4f3bc6f975e29543c6a0266c123276dbc9c3057dcee5b
-
SHA512
8fac729c002e2d0f7b20eb27caf599ddff1af44c3162ee4f9c5aab355869c577139e2c3d038a186fb6576825f7cca99c2a3cda20e64ea1672c9318992236d94f
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Paladin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Paladin.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Paladin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1420 Paladin.exe