Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    01-02-2022 17:30

General

  • Target

    loader.exe

  • Size

    5.2MB

  • MD5

    fc6f7b81b26442a2ba19d32530a5049a

  • SHA1

    bd0689478f7b3f5bf74af443a1b3a9a3d357bd64

  • SHA256

    b67222864ebeff001e105045e8e15b67d0483ea3a84bf02775f8aa2029d1ac08

  • SHA512

    fb136a02553cc28dfc9bc30b871413525365b22f78a7a0321d87734b6a53fe03b3bc1d8a1697c55af7e1a6a24762b2f40a529b0c9e384174ceae0f69f7da50e9

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\loader.exe
    "C:\Users\Admin\AppData\Local\Temp\loader.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1472

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1472-54-0x0000000075D61000-0x0000000075D63000-memory.dmp
    Filesize

    8KB

  • memory/1472-58-0x0000000000E30000-0x0000000001AEC000-memory.dmp
    Filesize

    12.7MB

  • memory/1472-59-0x0000000000E30000-0x0000000001AEC000-memory.dmp
    Filesize

    12.7MB

  • memory/1472-60-0x0000000003180000-0x0000000003181000-memory.dmp
    Filesize

    4KB