Analysis
-
max time kernel
107s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-01-2022 09:14
Static task
static1
Behavioral task
behavioral1
Sample
123456.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
123456.exe
-
Size
2.6MB
-
MD5
5dc4a3b523a6f6bae722979d338b98f8
-
SHA1
44043d7e66ab8131ad83654e6c5d93ba04b7c25e
-
SHA256
6594d1a9beec1d63c08f6e7b82826647f6df74f53e1cfedaac99430f6d7581a7
-
SHA512
dbc269f94b9c96595f552bf0be16d2a82782db8ab5526973223ca6a19463d9fe65f25d654a3ba3b6d8ef3456150477e0930d01e2b18eae3dd30a9d6ab2a0233f
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
123456.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 123456.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 123456.exe -
Processes:
resource yara_rule behavioral2/memory/1488-130-0x0000000000390000-0x0000000000A66000-memory.dmp themida behavioral2/memory/1488-131-0x0000000000390000-0x0000000000A66000-memory.dmp themida behavioral2/memory/1488-132-0x0000000000390000-0x0000000000A66000-memory.dmp themida behavioral2/memory/1488-133-0x0000000000390000-0x0000000000A66000-memory.dmp themida -
Processes:
123456.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 123456.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
123456.exepid process 1488 123456.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1488-130-0x0000000000390000-0x0000000000A66000-memory.dmpFilesize
6.8MB
-
memory/1488-131-0x0000000000390000-0x0000000000A66000-memory.dmpFilesize
6.8MB
-
memory/1488-132-0x0000000000390000-0x0000000000A66000-memory.dmpFilesize
6.8MB
-
memory/1488-133-0x0000000000390000-0x0000000000A66000-memory.dmpFilesize
6.8MB