Activate__Full__Setup.exe
Activate__Full__Setup.exe
2MB
19-01-2022 16:49
1e07343c234d91c56b9dd6618fe2707e
f6d0f9b4543897d9cc5fa6cf98003b74cdf5c237
32d3346ff0178589981d808bfd950b5867e6245bd659d27341269af83785bd6e
Filter: none
-
evasion
Description
evasion.
Tags
Reported IOCs
resource yara_rule behavioral2/memory/676-115-0x0000000000210000-0x00000000008C1000-memory.dmp evasion behavioral2/memory/676-117-0x0000000000210000-0x00000000008C1000-memory.dmp evasion -
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Tags
TTPs
-
Downloads MZ/PE file
-
Executes dropped EXEFile1.exeIntelRapid.exe
Reported IOCs
pid process 3992 File1.exe 3792 IntelRapid.exe -
Checks BIOS information in registryFile1.exeIntelRapid.exeActivate__Full__Setup.exe
Description
BIOS information is often read in order to detect sandboxing environments.
TTPs
Reported IOCs
description ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion File1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion File1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IntelRapid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IntelRapid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Activate__Full__Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Activate__Full__Setup.exe -
Drops startup fileFile1.exe
Reported IOCs
description ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelRapid.lnk File1.exe -
Reads user/profile data of web browsers
Description
Infostealers often target stored browser data, which can include saved credentials etc.
Tags
TTPs
-
Themida packer
Description
Detects Themida, an advanced Windows software protection system.
Tags
Reported IOCs
resource yara_rule behavioral2/memory/676-115-0x0000000000210000-0x00000000008C1000-memory.dmp themida behavioral2/memory/676-117-0x0000000000210000-0x00000000008C1000-memory.dmp themida behavioral2/files/0x000500000001ab44-119.dat themida behavioral2/files/0x000500000001ab44-118.dat themida behavioral2/memory/3992-120-0x00007FF7821D0000-0x00007FF782B41000-memory.dmp themida behavioral2/memory/3992-121-0x00007FF7821D0000-0x00007FF782B41000-memory.dmp themida behavioral2/memory/3992-122-0x00007FF7821D0000-0x00007FF782B41000-memory.dmp themida behavioral2/files/0x000500000001ab46-123.dat themida behavioral2/files/0x000500000001ab46-124.dat themida behavioral2/memory/3792-125-0x00007FF6B2070000-0x00007FF6B29E1000-memory.dmp themida behavioral2/memory/3792-126-0x00007FF6B2070000-0x00007FF6B29E1000-memory.dmp themida behavioral2/memory/3792-127-0x00007FF6B2070000-0x00007FF6B29E1000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting
Tags
TTPs
-
Checks installed software on the system
Description
Looks up Uninstall key entries in the registry to enumerate software on the system.
Tags
TTPs
-
Checks whether UAC is enabledActivate__Full__Setup.exeFile1.exeIntelRapid.exe
Tags
TTPs
Reported IOCs
description ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Activate__Full__Setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA File1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IntelRapid.exe -
Suspicious use of NtSetInformationThreadHideFromDebuggerActivate__Full__Setup.exeFile1.exeIntelRapid.exe
Reported IOCs
pid process 676 Activate__Full__Setup.exe 3992 File1.exe 3792 IntelRapid.exe -
Enumerates physical storage devices
Description
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
TTPs
-
Checks processor information in registryActivate__Full__Setup.exe
Description
Processor information is often read in order to detect sandboxing environments.
TTPs
Reported IOCs
description ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Activate__Full__Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Activate__Full__Setup.exe -
Delays execution with timeout.exetimeout.exe
Tags
Reported IOCs
pid process 2444 timeout.exe -
Suspicious behavior: AddClipboardFormatListenerIntelRapid.exe
Reported IOCs
pid process 3792 IntelRapid.exe -
Suspicious behavior: EnumeratesProcessesActivate__Full__Setup.exe
Reported IOCs
pid process 676 Activate__Full__Setup.exe 676 Activate__Full__Setup.exe -
Suspicious use of WriteProcessMemoryActivate__Full__Setup.execmd.exeFile1.exe
Reported IOCs
description pid process target process PID 676 wrote to memory of 3992 676 Activate__Full__Setup.exe File1.exe PID 676 wrote to memory of 3992 676 Activate__Full__Setup.exe File1.exe PID 676 wrote to memory of 2300 676 Activate__Full__Setup.exe cmd.exe PID 676 wrote to memory of 2300 676 Activate__Full__Setup.exe cmd.exe PID 676 wrote to memory of 2300 676 Activate__Full__Setup.exe cmd.exe PID 2300 wrote to memory of 2444 2300 cmd.exe timeout.exe PID 2300 wrote to memory of 2444 2300 cmd.exe timeout.exe PID 2300 wrote to memory of 2444 2300 cmd.exe timeout.exe PID 3992 wrote to memory of 3792 3992 File1.exe IntelRapid.exe PID 3992 wrote to memory of 3792 3992 File1.exe IntelRapid.exe
-
C:\Users\Admin\AppData\Local\Temp\Activate__Full__Setup.exe"C:\Users\Admin\AppData\Local\Temp\Activate__Full__Setup.exe"Checks BIOS information in registryChecks whether UAC is enabledSuspicious use of NtSetInformationThreadHideFromDebuggerChecks processor information in registrySuspicious behavior: EnumeratesProcessesSuspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\File1.exe"C:\Users\Admin\AppData\Local\Temp\File1.exe"Executes dropped EXEChecks BIOS information in registryDrops startup fileChecks whether UAC is enabledSuspicious use of NtSetInformationThreadHideFromDebuggerSuspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"Executes dropped EXEChecks BIOS information in registryChecks whether UAC is enabledSuspicious use of NtSetInformationThreadHideFromDebuggerSuspicious behavior: AddClipboardFormatListener
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Activate__Full__Setup.exe"Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 3Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\File1.exe
MD587ad64114de9c4c33525d0a7d0980b82
SHA113820afec0e13be059c17ececbede09cf39b6fa5
SHA2565d84c220f8fb9c93119698ba3212298e99fe688a1b7c749adb64a6d86a823f81
SHA512400a04039b1ca6851209574b53a3b90a218b6f324773528b0ccba2809e0475f4b5620e8f2d8575621ffbe67308759443720e3a2197da9bb8ed0f33e35a18607d
-
C:\Users\Admin\AppData\Local\Temp\File1.exe
MD587ad64114de9c4c33525d0a7d0980b82
SHA113820afec0e13be059c17ececbede09cf39b6fa5
SHA2565d84c220f8fb9c93119698ba3212298e99fe688a1b7c749adb64a6d86a823f81
SHA512400a04039b1ca6851209574b53a3b90a218b6f324773528b0ccba2809e0475f4b5620e8f2d8575621ffbe67308759443720e3a2197da9bb8ed0f33e35a18607d
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
MD587ad64114de9c4c33525d0a7d0980b82
SHA113820afec0e13be059c17ececbede09cf39b6fa5
SHA2565d84c220f8fb9c93119698ba3212298e99fe688a1b7c749adb64a6d86a823f81
SHA512400a04039b1ca6851209574b53a3b90a218b6f324773528b0ccba2809e0475f4b5620e8f2d8575621ffbe67308759443720e3a2197da9bb8ed0f33e35a18607d
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
MD587ad64114de9c4c33525d0a7d0980b82
SHA113820afec0e13be059c17ececbede09cf39b6fa5
SHA2565d84c220f8fb9c93119698ba3212298e99fe688a1b7c749adb64a6d86a823f81
SHA512400a04039b1ca6851209574b53a3b90a218b6f324773528b0ccba2809e0475f4b5620e8f2d8575621ffbe67308759443720e3a2197da9bb8ed0f33e35a18607d
-
memory/676-116-0x00000000772B0000-0x000000007743E000-memory.dmp
-
memory/676-117-0x0000000000210000-0x00000000008C1000-memory.dmp
-
memory/676-115-0x0000000000210000-0x00000000008C1000-memory.dmp
-
memory/3792-127-0x00007FF6B2070000-0x00007FF6B29E1000-memory.dmp
-
memory/3792-125-0x00007FF6B2070000-0x00007FF6B29E1000-memory.dmp
-
memory/3792-126-0x00007FF6B2070000-0x00007FF6B29E1000-memory.dmp
-
memory/3992-122-0x00007FF7821D0000-0x00007FF782B41000-memory.dmp
-
memory/3992-120-0x00007FF7821D0000-0x00007FF782B41000-memory.dmp
-
memory/3992-121-0x00007FF7821D0000-0x00007FF782B41000-memory.dmp