Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 02:36

General

  • Target

    7d6fc90ebd69e00192c9318fa33d86712c1d59ce2fbc9e5ce68c88c78bb3c0a1.exe

  • Size

    5.6MB

  • MD5

    6f31189187689bfa03f9fd58a240d36d

  • SHA1

    622c4b6284a15a7caeff238f388e1734333ce3d0

  • SHA256

    7d6fc90ebd69e00192c9318fa33d86712c1d59ce2fbc9e5ce68c88c78bb3c0a1

  • SHA512

    b0992dad6a17ec94179f0374178b444ef80f3ec58c1dc59da8002f6fb1a9ce1baf9ce557a85b0a1946ddc9bbd27d2530f27c605d8cf52038924252c8df4ae2f1

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 5 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d6fc90ebd69e00192c9318fa33d86712c1d59ce2fbc9e5ce68c88c78bb3c0a1.exe
    "C:\Users\Admin\AppData\Local\Temp\7d6fc90ebd69e00192c9318fa33d86712c1d59ce2fbc9e5ce68c88c78bb3c0a1.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4648
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 4648 -s 1136
      2⤵
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:3080
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 460 -p 4648 -ip 4648
    1⤵
    • Suspicious use of NtCreateProcessExOtherParentProcess
    • Suspicious use of WriteProcessMemory
    PID:3104
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3024
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3024-136-0x0000024D0C750000-0x0000024D0C760000-memory.dmp
    Filesize

    64KB

  • memory/3024-137-0x0000024D0CE20000-0x0000024D0CE30000-memory.dmp
    Filesize

    64KB

  • memory/3024-138-0x0000024D0F4D0000-0x0000024D0F4D4000-memory.dmp
    Filesize

    16KB

  • memory/4648-130-0x00007FF911FF0000-0x00007FF911FF2000-memory.dmp
    Filesize

    8KB

  • memory/4648-131-0x00007FF662D70000-0x00007FF663C37000-memory.dmp
    Filesize

    14.8MB

  • memory/4648-132-0x00007FF662D70000-0x00007FF663C37000-memory.dmp
    Filesize

    14.8MB

  • memory/4648-133-0x00007FF662D70000-0x00007FF663C37000-memory.dmp
    Filesize

    14.8MB

  • memory/4648-134-0x00007FF662D70000-0x00007FF663C37000-memory.dmp
    Filesize

    14.8MB

  • memory/4648-135-0x00007FF662D70000-0x00007FF663C37000-memory.dmp
    Filesize

    14.8MB