General
-
Target
IntelRapid.exe
-
Size
3.5MB
-
Sample
220119-rst6vaafd3
-
MD5
a9334eeb8615854db602db4447beeab2
-
SHA1
066ad5133b7435b75fe10d7af693c9b6811dc7a9
-
SHA256
d819e0689e1782f676e1644d503f31dae35589ea29b2b7169f69b81abea21d75
-
SHA512
a2f27c7716e2d7c2091a4f4a8b7fab7a9bd32d1640411cb9799756427b10468bc917963dab13c626d63fc6e0a081308779160f44a2987e68c250b41998d43b5c
Static task
static1
Behavioral task
behavioral1
Sample
IntelRapid.exe
Resource
win7-en-20211208
Malware Config
Targets
-
-
Target
IntelRapid.exe
-
Size
3.5MB
-
MD5
a9334eeb8615854db602db4447beeab2
-
SHA1
066ad5133b7435b75fe10d7af693c9b6811dc7a9
-
SHA256
d819e0689e1782f676e1644d503f31dae35589ea29b2b7169f69b81abea21d75
-
SHA512
a2f27c7716e2d7c2091a4f4a8b7fab7a9bd32d1640411cb9799756427b10468bc917963dab13c626d63fc6e0a081308779160f44a2987e68c250b41998d43b5c
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-