Analysis

  • max time kernel
    97s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-06-2022 15:01

General

  • Target

    GiftCard-Generator_SETUP.exe

  • Size

    3.3MB

  • MD5

    9e0728736c39c9aad664eaa7fadd1320

  • SHA1

    268e1488c03755b9f2ed506c46c855001327a80d

  • SHA256

    6895ceb670704f09844ef6c808a95510aabbe765362ff5cb98a7369d04fb27c9

  • SHA512

    3e4179bb7ae411967a34ea2a81c76f29c89a82726f636dd2ce43383d97d94c22130f382a6ce76d5181239e154fd7439894989f0a806db45e2ed49cca77103948

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Modifies extensions of user files 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GiftCard-Generator_SETUP.exe
    "C:\Users\Admin\AppData\Local\Temp\GiftCard-Generator_SETUP.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Modifies extensions of user files
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Suspicious use of FindShellTrayWindow
    PID:1364

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1364-54-0x00000000765F1000-0x00000000765F3000-memory.dmp
    Filesize

    8KB

  • memory/1364-55-0x0000000000FB0000-0x00000000017E2000-memory.dmp
    Filesize

    8.2MB

  • memory/1364-57-0x0000000000FB0000-0x00000000017E2000-memory.dmp
    Filesize

    8.2MB

  • memory/1364-58-0x0000000000FB0000-0x00000000017E2000-memory.dmp
    Filesize

    8.2MB

  • memory/1364-59-0x0000000005230000-0x00000000052E0000-memory.dmp
    Filesize

    704KB

  • memory/1364-60-0x0000000004F15000-0x0000000004F26000-memory.dmp
    Filesize

    68KB