Analysis
-
max time kernel
41s -
max time network
42s -
platform
windows10_x64 -
resource
win10-de-20211208 -
submitted
14-02-2022 15:18
Static task
static1
General
-
Target
airplane.wtf.exe
-
Size
3.8MB
-
MD5
fb1e695f13801baad5faec13476caea0
-
SHA1
234cbf5fb007db06026223c9bf0dc2a57c633570
-
SHA256
f47b1ed305aa05b5b84e7b994e8e6e5e8013831fec6b8922e8309d5ce28f12bc
-
SHA512
258005109e2b4e8974411c292dc06293783c904649bd61792c814e532cfd578e00a8576cda26158d20718d484774a3362ce0fe6140ddeb30169c28ea506f04ad
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
airplane.wtf.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion airplane.wtf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion airplane.wtf.exe -
Processes:
resource yara_rule behavioral1/memory/3168-116-0x0000000000AC0000-0x0000000001476000-memory.dmp themida behavioral1/memory/3168-118-0x0000000000AC0000-0x0000000001476000-memory.dmp themida -
Processes:
airplane.wtf.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA airplane.wtf.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
airplane.wtf.exepid process 3168 airplane.wtf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
airplane.wtf.exepid process 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe 3168 airplane.wtf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
airplane.wtf.exedescription pid process Token: SeDebugPrivilege 3168 airplane.wtf.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
airplane.wtf.exepid process 3168 airplane.wtf.exe 3168 airplane.wtf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\airplane.wtf.exe"C:\Users\Admin\AppData\Local\Temp\airplane.wtf.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3168