Analysis

  • max time kernel
    24s
  • max time network
    24s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-12-2021 12:50

General

  • Target

    aInjector Win64_x32.exe

  • Size

    3.6MB

  • MD5

    45539053a6c4a180b590a7af970fc3ab

  • SHA1

    8a091f013cdbe5b0f7308692a75bd95c544a7e5a

  • SHA256

    e341a13e9d2d6974d68018a8d8f28f4a40ef8b1fe063384eda97ebbbad7ab80a

  • SHA512

    498c61bb0949ef48e1bf834e3fce02ddc7b857e794ce02d97c615f03d2c93420799cd7476bdd4bb15768396cd28668060da0c6e9914039d6bc010f32ddafea85

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aInjector Win64_x32.exe
    "C:\Users\Admin\AppData\Local\Temp\aInjector Win64_x32.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:944

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/944-54-0x0000000076151000-0x0000000076153000-memory.dmp
    Filesize

    8KB

  • memory/944-58-0x0000000000360000-0x0000000000361000-memory.dmp
    Filesize

    4KB

  • memory/944-60-0x00000000010A0000-0x00000000010FA000-memory.dmp
    Filesize

    360KB

  • memory/944-61-0x0000000000350000-0x0000000000351000-memory.dmp
    Filesize

    4KB

  • memory/944-62-0x00000000053B0000-0x00000000053B1000-memory.dmp
    Filesize

    4KB