Analysis
-
max time kernel
122s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09-01-2022 13:43
Static task
static1
Behavioral task
behavioral1
Sample
luzhou.exe
Resource
win7-en-20211208
General
-
Target
luzhou.exe
-
Size
2.7MB
-
MD5
3ae6147ee830216aa9e60610a5a46409
-
SHA1
e56fe77b928782d7de59323a1d2543059f820a30
-
SHA256
067d79883c880e8d3a0c77d0f211abe52991e00aff3489cd04c5b5180125fb65
-
SHA512
c256d66f909dd75322890d4b21b86559f04f877768994e011b9e0030c57a9d72637799f291da8a7e67aa71aecd4faf5fb02c76a97a6fcbbbef680b3489b3d2c4
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
DpEditor.exepid process 2312 DpEditor.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
luzhou.exeDpEditor.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion luzhou.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion luzhou.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DpEditor.exe -
Processes:
resource yara_rule behavioral2/memory/1052-115-0x0000000000DF0000-0x00000000014E3000-memory.dmp themida behavioral2/memory/1052-117-0x0000000000DF0000-0x00000000014E3000-memory.dmp themida behavioral2/memory/1052-118-0x0000000000DF0000-0x00000000014E3000-memory.dmp themida behavioral2/memory/1052-119-0x0000000000DF0000-0x00000000014E3000-memory.dmp themida C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida behavioral2/memory/2312-123-0x00000000000A0000-0x0000000000793000-memory.dmp themida behavioral2/memory/2312-124-0x00000000000A0000-0x0000000000793000-memory.dmp themida behavioral2/memory/2312-126-0x00000000000A0000-0x0000000000793000-memory.dmp themida behavioral2/memory/2312-127-0x00000000000A0000-0x0000000000793000-memory.dmp themida -
Processes:
luzhou.exeDpEditor.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA luzhou.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DpEditor.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
luzhou.exeDpEditor.exepid process 1052 luzhou.exe 2312 DpEditor.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
DpEditor.exepid process 2312 DpEditor.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
luzhou.exeDpEditor.exepid process 1052 luzhou.exe 1052 luzhou.exe 2312 DpEditor.exe 2312 DpEditor.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
luzhou.exedescription pid process target process PID 1052 wrote to memory of 2312 1052 luzhou.exe DpEditor.exe PID 1052 wrote to memory of 2312 1052 luzhou.exe DpEditor.exe PID 1052 wrote to memory of 2312 1052 luzhou.exe DpEditor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\luzhou.exe"C:\Users\Admin\AppData\Local\Temp\luzhou.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
3ae6147ee830216aa9e60610a5a46409
SHA1e56fe77b928782d7de59323a1d2543059f820a30
SHA256067d79883c880e8d3a0c77d0f211abe52991e00aff3489cd04c5b5180125fb65
SHA512c256d66f909dd75322890d4b21b86559f04f877768994e011b9e0030c57a9d72637799f291da8a7e67aa71aecd4faf5fb02c76a97a6fcbbbef680b3489b3d2c4
-
MD5
3ae6147ee830216aa9e60610a5a46409
SHA1e56fe77b928782d7de59323a1d2543059f820a30
SHA256067d79883c880e8d3a0c77d0f211abe52991e00aff3489cd04c5b5180125fb65
SHA512c256d66f909dd75322890d4b21b86559f04f877768994e011b9e0030c57a9d72637799f291da8a7e67aa71aecd4faf5fb02c76a97a6fcbbbef680b3489b3d2c4