Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
15-02-2022 15:07
Static task
static1
Behavioral task
behavioral1
Sample
1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011.exe
Resource
win7-en-20211208
General
-
Target
1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011.exe
-
Size
2.8MB
-
MD5
bad0db39ff38f874c1cce6b59d3203ab
-
SHA1
c58461e1d930a917ba6553bf26e31ad438dfcbea
-
SHA256
1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011
-
SHA512
256a195de7825b771a1aa5f546852b77b90b8b1f2c5e4178d7abf520b4cbd880a853af1d82d5e88db3502652e9afc2d507b920540a8944d76df71fd1a570f19d
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
DpEditor.exepid process 1336 DpEditor.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
DpEditor.exe1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DpEditor.exe -
Loads dropped DLL 1 IoCs
Processes:
1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011.exepid process 976 1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011.exe -
Processes:
resource yara_rule behavioral1/memory/976-55-0x00000000008E0000-0x000000000102D000-memory.dmp themida behavioral1/memory/976-56-0x00000000008E0000-0x000000000102D000-memory.dmp themida behavioral1/memory/976-57-0x00000000008E0000-0x000000000102D000-memory.dmp themida behavioral1/memory/976-58-0x00000000008E0000-0x000000000102D000-memory.dmp themida \Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida behavioral1/memory/1336-63-0x0000000000FA0000-0x00000000016ED000-memory.dmp themida behavioral1/memory/1336-64-0x0000000000FA0000-0x00000000016ED000-memory.dmp themida behavioral1/memory/1336-65-0x0000000000FA0000-0x00000000016ED000-memory.dmp themida behavioral1/memory/1336-66-0x0000000000FA0000-0x00000000016ED000-memory.dmp themida -
Processes:
1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011.exeDpEditor.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DpEditor.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011.exeDpEditor.exepid process 976 1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011.exe 1336 DpEditor.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
DpEditor.exepid process 1336 DpEditor.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011.exeDpEditor.exepid process 976 1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011.exe 1336 DpEditor.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011.exedescription pid process target process PID 976 wrote to memory of 1336 976 1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011.exe DpEditor.exe PID 976 wrote to memory of 1336 976 1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011.exe DpEditor.exe PID 976 wrote to memory of 1336 976 1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011.exe DpEditor.exe PID 976 wrote to memory of 1336 976 1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011.exe DpEditor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011.exe"C:\Users\Admin\AppData\Local\Temp\1eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011.exe"1⤵
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:1336
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
bad0db39ff38f874c1cce6b59d3203ab
SHA1c58461e1d930a917ba6553bf26e31ad438dfcbea
SHA2561eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011
SHA512256a195de7825b771a1aa5f546852b77b90b8b1f2c5e4178d7abf520b4cbd880a853af1d82d5e88db3502652e9afc2d507b920540a8944d76df71fd1a570f19d
-
MD5
bad0db39ff38f874c1cce6b59d3203ab
SHA1c58461e1d930a917ba6553bf26e31ad438dfcbea
SHA2561eaab711efe047594f241a0386854db64475c1bb77a75a92e5daa8b6c424e011
SHA512256a195de7825b771a1aa5f546852b77b90b8b1f2c5e4178d7abf520b4cbd880a853af1d82d5e88db3502652e9afc2d507b920540a8944d76df71fd1a570f19d