Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
15-02-2022 13:41
Static task
static1
Behavioral task
behavioral1
Sample
4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79.exe
Resource
win7-en-20211208
General
-
Target
4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79.exe
-
Size
2.7MB
-
MD5
84f53b26739d97cbdcd526c5ec88715d
-
SHA1
ab1d8d6a13e3c2793408944a83e4dec04a919f14
-
SHA256
4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79
-
SHA512
b825c54e4806165392bc9aff674cf88774e977ac7cf1ec3b40dab4fa04f1c120d1d637a2892a86dd55ffc5a1e26cf2e4e23251c99cd03bd213ba39b0c66dcaca
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
DpEditor.exepid process 268 DpEditor.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
DpEditor.exe4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DpEditor.exe -
Loads dropped DLL 1 IoCs
Processes:
4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79.exepid process 764 4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79.exe -
Processes:
resource yara_rule behavioral1/memory/764-55-0x0000000000DE0000-0x00000000014D7000-memory.dmp themida behavioral1/memory/764-56-0x0000000000DE0000-0x00000000014D7000-memory.dmp themida behavioral1/memory/764-58-0x0000000000DE0000-0x00000000014D7000-memory.dmp themida behavioral1/memory/764-57-0x0000000000DE0000-0x00000000014D7000-memory.dmp themida \Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida behavioral1/memory/268-63-0x0000000001040000-0x0000000001737000-memory.dmp themida behavioral1/memory/268-64-0x0000000001040000-0x0000000001737000-memory.dmp themida behavioral1/memory/268-65-0x0000000001040000-0x0000000001737000-memory.dmp themida behavioral1/memory/268-66-0x0000000001040000-0x0000000001737000-memory.dmp themida -
Processes:
DpEditor.exe4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DpEditor.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79.exeDpEditor.exepid process 764 4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79.exe 268 DpEditor.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
DpEditor.exepid process 268 DpEditor.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79.exeDpEditor.exepid process 764 4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79.exe 268 DpEditor.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79.exedescription pid process target process PID 764 wrote to memory of 268 764 4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79.exe DpEditor.exe PID 764 wrote to memory of 268 764 4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79.exe DpEditor.exe PID 764 wrote to memory of 268 764 4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79.exe DpEditor.exe PID 764 wrote to memory of 268 764 4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79.exe DpEditor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79.exe"C:\Users\Admin\AppData\Local\Temp\4a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79.exe"1⤵
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
84f53b26739d97cbdcd526c5ec88715d
SHA1ab1d8d6a13e3c2793408944a83e4dec04a919f14
SHA2564a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79
SHA512b825c54e4806165392bc9aff674cf88774e977ac7cf1ec3b40dab4fa04f1c120d1d637a2892a86dd55ffc5a1e26cf2e4e23251c99cd03bd213ba39b0c66dcaca
-
MD5
84f53b26739d97cbdcd526c5ec88715d
SHA1ab1d8d6a13e3c2793408944a83e4dec04a919f14
SHA2564a28b94c2370f23f68f78368ba399ee38aaedf3afa52eaf6f84b394e3e435a79
SHA512b825c54e4806165392bc9aff674cf88774e977ac7cf1ec3b40dab4fa04f1c120d1d637a2892a86dd55ffc5a1e26cf2e4e23251c99cd03bd213ba39b0c66dcaca