Analysis

  • max time kernel
    115s
  • max time network
    122s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    29-12-2021 20:20

General

  • Target

    5d78b8a09809b8d1b9974a27b55c9c71ce2aa8cc6846ba5cb9115b8ce44a14cf.exe

  • Size

    2.7MB

  • MD5

    6f4c94326104917216f67d8511b58e76

  • SHA1

    2cece96508040c197e778832ff4df1768b87479f

  • SHA256

    5d78b8a09809b8d1b9974a27b55c9c71ce2aa8cc6846ba5cb9115b8ce44a14cf

  • SHA512

    c51bf945e1435c6aab82544fb80854f00823bbc57d78b045da6ec70a9c44e9269f9080f85465fe6a10f69052c2a17f126dd75efd376c7ee169f5d9af4a9e9969

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 10 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d78b8a09809b8d1b9974a27b55c9c71ce2aa8cc6846ba5cb9115b8ce44a14cf.exe
    "C:\Users\Admin\AppData\Local\Temp\5d78b8a09809b8d1b9974a27b55c9c71ce2aa8cc6846ba5cb9115b8ce44a14cf.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
      "C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      PID:1332

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
    MD5

    6f4c94326104917216f67d8511b58e76

    SHA1

    2cece96508040c197e778832ff4df1768b87479f

    SHA256

    5d78b8a09809b8d1b9974a27b55c9c71ce2aa8cc6846ba5cb9115b8ce44a14cf

    SHA512

    c51bf945e1435c6aab82544fb80854f00823bbc57d78b045da6ec70a9c44e9269f9080f85465fe6a10f69052c2a17f126dd75efd376c7ee169f5d9af4a9e9969

  • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
    MD5

    6f4c94326104917216f67d8511b58e76

    SHA1

    2cece96508040c197e778832ff4df1768b87479f

    SHA256

    5d78b8a09809b8d1b9974a27b55c9c71ce2aa8cc6846ba5cb9115b8ce44a14cf

    SHA512

    c51bf945e1435c6aab82544fb80854f00823bbc57d78b045da6ec70a9c44e9269f9080f85465fe6a10f69052c2a17f126dd75efd376c7ee169f5d9af4a9e9969

  • memory/1332-124-0x0000000001170000-0x0000000001860000-memory.dmp
    Filesize

    6.9MB

  • memory/1332-120-0x0000000000000000-mapping.dmp
  • memory/1332-123-0x0000000001170000-0x0000000001860000-memory.dmp
    Filesize

    6.9MB

  • memory/1332-125-0x0000000001170000-0x0000000001860000-memory.dmp
    Filesize

    6.9MB

  • memory/1332-127-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/1332-126-0x0000000001170000-0x0000000001860000-memory.dmp
    Filesize

    6.9MB

  • memory/2992-118-0x00000000003A0000-0x0000000000A90000-memory.dmp
    Filesize

    6.9MB

  • memory/2992-119-0x00000000003A0000-0x0000000000A90000-memory.dmp
    Filesize

    6.9MB

  • memory/2992-117-0x0000000077A60000-0x0000000077BEE000-memory.dmp
    Filesize

    1.6MB

  • memory/2992-116-0x00000000003A0000-0x0000000000A90000-memory.dmp
    Filesize

    6.9MB

  • memory/2992-115-0x00000000003A0000-0x0000000000A90000-memory.dmp
    Filesize

    6.9MB