Analysis

  • max time kernel
    88s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    25-06-2022 15:01

General

  • Target

    GiftCard-Generator_SETUP.exe

  • Size

    3.3MB

  • MD5

    9e0728736c39c9aad664eaa7fadd1320

  • SHA1

    268e1488c03755b9f2ed506c46c855001327a80d

  • SHA256

    6895ceb670704f09844ef6c808a95510aabbe765362ff5cb98a7369d04fb27c9

  • SHA512

    3e4179bb7ae411967a34ea2a81c76f29c89a82726f636dd2ce43383d97d94c22130f382a6ce76d5181239e154fd7439894989f0a806db45e2ed49cca77103948

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GiftCard-Generator_SETUP.exe
    "C:\Users\Admin\AppData\Local\Temp\GiftCard-Generator_SETUP.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Modifies extensions of user files
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    PID:2556

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2556-130-0x0000000000200000-0x0000000000A32000-memory.dmp
    Filesize

    8.2MB

  • memory/2556-132-0x0000000000200000-0x0000000000A32000-memory.dmp
    Filesize

    8.2MB

  • memory/2556-133-0x0000000000200000-0x0000000000A32000-memory.dmp
    Filesize

    8.2MB

  • memory/2556-134-0x0000000005E60000-0x0000000006404000-memory.dmp
    Filesize

    5.6MB

  • memory/2556-135-0x00000000057E0000-0x0000000005872000-memory.dmp
    Filesize

    584KB

  • memory/2556-136-0x0000000005990000-0x00000000059B2000-memory.dmp
    Filesize

    136KB

  • memory/2556-137-0x0000000000200000-0x0000000000A32000-memory.dmp
    Filesize

    8.2MB

  • memory/2556-138-0x0000000001380000-0x000000000138A000-memory.dmp
    Filesize

    40KB