Analysis

  • max time kernel
    110s
  • max time network
    121s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    03-12-2021 17:12

General

  • Target

    f1625b7d5fbc31ce741aeaa3af8d20d7cc7d07d6652b3b873b26a6a81e70e32a.exe

  • Size

    2.8MB

  • MD5

    b0bfa71857896435455b4384a4904dd2

  • SHA1

    8336a87ff18d396c1bda1f59d0e5c9cd0c7e996f

  • SHA256

    f1625b7d5fbc31ce741aeaa3af8d20d7cc7d07d6652b3b873b26a6a81e70e32a

  • SHA512

    a330ef0ae0f2d48bc5a06202bf2b0c1aac672873dc9c6643a5215748a502302c063ef32357279fc65f16c8342e3f5810795475177cdf7e46bae30207da9b15fb

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 10 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1625b7d5fbc31ce741aeaa3af8d20d7cc7d07d6652b3b873b26a6a81e70e32a.exe
    "C:\Users\Admin\AppData\Local\Temp\f1625b7d5fbc31ce741aeaa3af8d20d7cc7d07d6652b3b873b26a6a81e70e32a.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
      "C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      PID:1296

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
    MD5

    b0bfa71857896435455b4384a4904dd2

    SHA1

    8336a87ff18d396c1bda1f59d0e5c9cd0c7e996f

    SHA256

    f1625b7d5fbc31ce741aeaa3af8d20d7cc7d07d6652b3b873b26a6a81e70e32a

    SHA512

    a330ef0ae0f2d48bc5a06202bf2b0c1aac672873dc9c6643a5215748a502302c063ef32357279fc65f16c8342e3f5810795475177cdf7e46bae30207da9b15fb

  • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
    MD5

    b0bfa71857896435455b4384a4904dd2

    SHA1

    8336a87ff18d396c1bda1f59d0e5c9cd0c7e996f

    SHA256

    f1625b7d5fbc31ce741aeaa3af8d20d7cc7d07d6652b3b873b26a6a81e70e32a

    SHA512

    a330ef0ae0f2d48bc5a06202bf2b0c1aac672873dc9c6643a5215748a502302c063ef32357279fc65f16c8342e3f5810795475177cdf7e46bae30207da9b15fb

  • memory/1296-127-0x00000000009B0000-0x00000000010F9000-memory.dmp
    Filesize

    7.3MB

  • memory/1296-123-0x0000000000000000-mapping.dmp
  • memory/1296-126-0x00000000009B0000-0x00000000010F9000-memory.dmp
    Filesize

    7.3MB

  • memory/1296-128-0x0000000077250000-0x00000000773DE000-memory.dmp
    Filesize

    1.6MB

  • memory/1296-129-0x00000000009B0000-0x00000000010F9000-memory.dmp
    Filesize

    7.3MB

  • memory/1296-130-0x00000000009B0000-0x00000000010F9000-memory.dmp
    Filesize

    7.3MB

  • memory/2696-121-0x00000000013E0000-0x0000000001B29000-memory.dmp
    Filesize

    7.3MB

  • memory/2696-122-0x0000000077250000-0x00000000773DE000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-120-0x00000000013E0000-0x0000000001B29000-memory.dmp
    Filesize

    7.3MB

  • memory/2696-119-0x00000000013E0000-0x0000000001B29000-memory.dmp
    Filesize

    7.3MB

  • memory/2696-118-0x00000000013E0000-0x0000000001B29000-memory.dmp
    Filesize

    7.3MB