Analysis
-
max time kernel
83s -
max time network
123s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
19-12-2021 10:17
Static task
static1
General
-
Target
65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe
-
Size
8.9MB
-
MD5
59f099c8c5ab999d21efdec931b40060
-
SHA1
337fc8dd6cab8c77aa9dfa42640bc14230fa665a
-
SHA256
65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f
-
SHA512
4dd42bf8a06258e0ffd2fa5b3eb9c6d906f80453037d8efd128abed6934ed1f3a975a791c8d4b40fbf1ed5b99897c9e1330863039adbddaaf52ca4f0d8ba6750
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe -
Processes:
resource yara_rule behavioral1/memory/2424-115-0x0000000000400000-0x0000000001C1D000-memory.dmp themida behavioral1/memory/2424-116-0x0000000000400000-0x0000000001C1D000-memory.dmp themida behavioral1/memory/2424-118-0x0000000000400000-0x0000000001C1D000-memory.dmp themida -
Processes:
65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exepid process 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exepid process 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
Processes:
65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exedescription pid process Token: SeDebugPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: 1 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeCreateTokenPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeAssignPrimaryTokenPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeLockMemoryPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeIncreaseQuotaPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeMachineAccountPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeTcbPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeSecurityPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeTakeOwnershipPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeLoadDriverPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeSystemProfilePrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeSystemtimePrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeProfSingleProcessPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeIncBasePriorityPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeCreatePagefilePrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeCreatePermanentPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeBackupPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeRestorePrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeShutdownPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeDebugPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeAuditPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeSystemEnvironmentPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeChangeNotifyPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeRemoteShutdownPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeUndockPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeSyncAgentPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeEnableDelegationPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeManageVolumePrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeImpersonatePrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: SeCreateGlobalPrivilege 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: 31 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: 32 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: 33 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: 34 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: 35 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: 36 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: 37 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: 38 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: 39 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: 40 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: 41 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: 42 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: 43 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: 44 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: 45 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: 46 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: 47 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe Token: 48 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exepid process 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exepid process 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exepid process 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe 2424 65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe"C:\Users\Admin\AppData\Local\Temp\65e6f66f1d642977aeea3ad689f91fe24496907e90f7842c5dd0ce5c2ae8a28f.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2424