IntelRapid.exe
IntelRapid.exe
3MB
19-01-2022 14:30
a9334eeb8615854db602db4447beeab2
066ad5133b7435b75fe10d7af693c9b6811dc7a9
d819e0689e1782f676e1644d503f31dae35589ea29b2b7169f69b81abea21d75
Filter: none
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Tags
TTPs
-
Executes dropped EXEIntelRapid.exe
Reported IOCs
pid process 1660 IntelRapid.exe -
Checks BIOS information in registryIntelRapid.exeIntelRapid.exe
Description
BIOS information is often read in order to detect sandboxing environments.
TTPs
Reported IOCs
description ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IntelRapid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IntelRapid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IntelRapid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IntelRapid.exe -
Drops startup fileIntelRapid.exe
Reported IOCs
description ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelRapid.lnk IntelRapid.exe -
Loads dropped DLLIntelRapid.exe
Reported IOCs
pid process 1636 IntelRapid.exe 1636 IntelRapid.exe 1636 IntelRapid.exe -
Themida packer
Description
Detects Themida, an advanced Windows software protection system.
Tags
Reported IOCs
resource yara_rule behavioral1/memory/1636-54-0x000000013F9C0000-0x0000000140331000-memory.dmp themida behavioral1/memory/1636-55-0x000000013F9C0000-0x0000000140331000-memory.dmp themida behavioral1/memory/1636-56-0x000000013F9C0000-0x0000000140331000-memory.dmp themida behavioral1/files/0x0007000000013225-58.dat themida behavioral1/files/0x0007000000013225-59.dat themida behavioral1/files/0x0007000000013225-60.dat themida behavioral1/files/0x0007000000013225-61.dat themida behavioral1/memory/1660-62-0x000000013FE50000-0x00000001407C1000-memory.dmp themida behavioral1/memory/1660-63-0x000000013FE50000-0x00000001407C1000-memory.dmp themida behavioral1/memory/1660-64-0x000000013FE50000-0x00000001407C1000-memory.dmp themida -
Checks whether UAC is enabledIntelRapid.exeIntelRapid.exe
Tags
TTPs
Reported IOCs
description ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IntelRapid.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IntelRapid.exe -
Suspicious use of NtSetInformationThreadHideFromDebuggerIntelRapid.exeIntelRapid.exe
Reported IOCs
pid process 1636 IntelRapid.exe 1660 IntelRapid.exe -
Enumerates physical storage devices
Description
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
TTPs
-
Suspicious behavior: AddClipboardFormatListenerIntelRapid.exe
Reported IOCs
pid process 1660 IntelRapid.exe -
Suspicious use of WriteProcessMemoryIntelRapid.exe
Reported IOCs
description pid process target process PID 1636 wrote to memory of 1660 1636 IntelRapid.exe IntelRapid.exe PID 1636 wrote to memory of 1660 1636 IntelRapid.exe IntelRapid.exe PID 1636 wrote to memory of 1660 1636 IntelRapid.exe IntelRapid.exe
-
C:\Users\Admin\AppData\Local\Temp\IntelRapid.exe"C:\Users\Admin\AppData\Local\Temp\IntelRapid.exe"Checks BIOS information in registryDrops startup fileLoads dropped DLLChecks whether UAC is enabledSuspicious use of NtSetInformationThreadHideFromDebuggerSuspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"Executes dropped EXEChecks BIOS information in registryChecks whether UAC is enabledSuspicious use of NtSetInformationThreadHideFromDebuggerSuspicious behavior: AddClipboardFormatListener
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
MD5a9334eeb8615854db602db4447beeab2
SHA1066ad5133b7435b75fe10d7af693c9b6811dc7a9
SHA256d819e0689e1782f676e1644d503f31dae35589ea29b2b7169f69b81abea21d75
SHA512a2f27c7716e2d7c2091a4f4a8b7fab7a9bd32d1640411cb9799756427b10468bc917963dab13c626d63fc6e0a081308779160f44a2987e68c250b41998d43b5c
-
\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
MD5a9334eeb8615854db602db4447beeab2
SHA1066ad5133b7435b75fe10d7af693c9b6811dc7a9
SHA256d819e0689e1782f676e1644d503f31dae35589ea29b2b7169f69b81abea21d75
SHA512a2f27c7716e2d7c2091a4f4a8b7fab7a9bd32d1640411cb9799756427b10468bc917963dab13c626d63fc6e0a081308779160f44a2987e68c250b41998d43b5c
-
\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
MD5a9334eeb8615854db602db4447beeab2
SHA1066ad5133b7435b75fe10d7af693c9b6811dc7a9
SHA256d819e0689e1782f676e1644d503f31dae35589ea29b2b7169f69b81abea21d75
SHA512a2f27c7716e2d7c2091a4f4a8b7fab7a9bd32d1640411cb9799756427b10468bc917963dab13c626d63fc6e0a081308779160f44a2987e68c250b41998d43b5c
-
\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
MD5a9334eeb8615854db602db4447beeab2
SHA1066ad5133b7435b75fe10d7af693c9b6811dc7a9
SHA256d819e0689e1782f676e1644d503f31dae35589ea29b2b7169f69b81abea21d75
SHA512a2f27c7716e2d7c2091a4f4a8b7fab7a9bd32d1640411cb9799756427b10468bc917963dab13c626d63fc6e0a081308779160f44a2987e68c250b41998d43b5c
-
memory/1636-56-0x000000013F9C0000-0x0000000140331000-memory.dmp
-
memory/1636-57-0x000007FEFB8C1000-0x000007FEFB8C3000-memory.dmp
-
memory/1636-54-0x000000013F9C0000-0x0000000140331000-memory.dmp
-
memory/1636-55-0x000000013F9C0000-0x0000000140331000-memory.dmp
-
memory/1660-62-0x000000013FE50000-0x00000001407C1000-memory.dmp
-
memory/1660-63-0x000000013FE50000-0x00000001407C1000-memory.dmp
-
memory/1660-64-0x000000013FE50000-0x00000001407C1000-memory.dmp