Resubmissions

25-01-2022 16:56

220125-vf2xpsbeb5 9

11-01-2022 16:17

220111-trh4asgcb9 9

General

  • Target

    New_Order.exe

  • Size

    2.6MB

  • Sample

    220125-vf2xpsbeb5

  • MD5

    3b585ac87a4c039f3685c66cadc62960

  • SHA1

    a7f60a4dd8931e81b736adc744a4e709e8c5ffe7

  • SHA256

    60fb9597e5843c72d761525f73ca728409579d81901860981ebd84f7d153cfa3

  • SHA512

    bf2c4dea4cf1174562b60a6793111aa486e512c4a2e4da1d227ff3852a2c8e7892f1a3bc8ec2eb1315ebaa353f13fa684bade76b4c9c807cf0e86b5ac3903dfd

Malware Config

Targets

    • Target

      New_Order.exe

    • Size

      2.6MB

    • MD5

      3b585ac87a4c039f3685c66cadc62960

    • SHA1

      a7f60a4dd8931e81b736adc744a4e709e8c5ffe7

    • SHA256

      60fb9597e5843c72d761525f73ca728409579d81901860981ebd84f7d153cfa3

    • SHA512

      bf2c4dea4cf1174562b60a6793111aa486e512c4a2e4da1d227ff3852a2c8e7892f1a3bc8ec2eb1315ebaa353f13fa684bade76b4c9c807cf0e86b5ac3903dfd

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses Microsoft Outlook profiles

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Collection

Email Collection

1
T1114

Tasks