Analysis
-
max time kernel
138s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
26-06-2022 18:24
Static task
static1
Behavioral task
behavioral1
Sample
File.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
File.exe
Resource
win10v2004-20220414-en
amadeydjvumodiloadernymaimrecordbreakerredlinevidar144833334937logsdiller cloud (telegram: @mr_golds)discoveryevasioninfostealerpersistencepyinstallerransomwarespywarestealersuricatathemidatrojanupx
0 signatures
0 seconds
General
-
Target
File.exe
-
Size
3.6MB
-
MD5
b90ef112633b9fd8699ca1939991f2c1
-
SHA1
8789bc4406d047c4fee84f74b64352f3c6eb2274
-
SHA256
3d3401c3aea61905a7d1bf31b25f7c1910e1fd00aef7e07e253a21c216ffac7a
-
SHA512
ab0415230607e27d2017d21d65678a1bb0c399da52dc9b64c7126e10a497ae4dad645673592c2e4ef9c01473f005e3b521e874ee26c52950f35462b2d4bd53d8
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ File.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion File.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion File.exe -
resource yara_rule behavioral1/memory/1960-56-0x0000000000F60000-0x000000000134B000-memory.dmp themida behavioral1/memory/1960-55-0x0000000000F60000-0x000000000134B000-memory.dmp themida behavioral1/memory/1960-57-0x0000000000F60000-0x000000000134B000-memory.dmp themida behavioral1/memory/1960-59-0x0000000000F60000-0x000000000134B000-memory.dmp themida behavioral1/memory/1960-61-0x0000000000F60000-0x000000000134B000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA File.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1960 File.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1960 File.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\File.exe"C:\Users\Admin\AppData\Local\Temp\File.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1960