Analysis

  • max time kernel
    25s
  • max time network
    30s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    01-02-2022 17:30

General

  • Target

    loader.exe

  • Size

    5.2MB

  • MD5

    fc6f7b81b26442a2ba19d32530a5049a

  • SHA1

    bd0689478f7b3f5bf74af443a1b3a9a3d357bd64

  • SHA256

    b67222864ebeff001e105045e8e15b67d0483ea3a84bf02775f8aa2029d1ac08

  • SHA512

    fb136a02553cc28dfc9bc30b871413525365b22f78a7a0321d87734b6a53fe03b3bc1d8a1697c55af7e1a6a24762b2f40a529b0c9e384174ceae0f69f7da50e9

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies data under HKEY_USERS 21 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\loader.exe
    "C:\Users\Admin\AppData\Local\Temp\loader.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4120
  • C:\Windows\System32\WaaSMedicAgent.exe
    C:\Windows\System32\WaaSMedicAgent.exe d3329334d69009bb12d92b8b63d0754b nvpuGvYjIkeXhUYmuHN8yw.0.1.0.0.0
    1⤵
    • Modifies data under HKEY_USERS
    PID:4596

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4120-133-0x0000000000A70000-0x000000000172C000-memory.dmp
    Filesize

    12.7MB

  • memory/4120-134-0x0000000000A70000-0x000000000172C000-memory.dmp
    Filesize

    12.7MB

  • memory/4120-135-0x00000000062E0000-0x0000000006346000-memory.dmp
    Filesize

    408KB