Analysis
-
max time kernel
55s -
max time network
63s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
29-06-2022 13:30
Static task
static1
General
-
Target
svchost.exe
-
Size
4.7MB
-
MD5
caf868707adce7bd76d809f10075b032
-
SHA1
7d3e44479df8ecb854bff9643fa5bf9f5ef36337
-
SHA256
69f1f159f96722fd44aea716c322eb0ce793517110ed17b986db0163627696bd
-
SHA512
f286b6de253a4b482f3bdca81e85f14338cb8c35472e20d6c4372d27b926f81a6a60b6c89eb22d39ab23db7db49f20d5ff53a703e0fda695e6889e70d137b927
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Processes:
resource yara_rule behavioral1/memory/1792-114-0x00007FF7B8420000-0x00007FF7B90BD000-memory.dmp themida behavioral1/memory/1792-116-0x00007FF7B8420000-0x00007FF7B90BD000-memory.dmp themida behavioral1/memory/1792-117-0x00007FF7B8420000-0x00007FF7B90BD000-memory.dmp themida behavioral1/memory/1792-118-0x00007FF7B8420000-0x00007FF7B90BD000-memory.dmp themida behavioral1/memory/1792-119-0x00007FF7B8420000-0x00007FF7B90BD000-memory.dmp themida -
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
svchost.exepid process 1792 svchost.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1792-114-0x00007FF7B8420000-0x00007FF7B90BD000-memory.dmpFilesize
12.6MB
-
memory/1792-115-0x00007FFE92830000-0x00007FFE92A0B000-memory.dmpFilesize
1.9MB
-
memory/1792-116-0x00007FF7B8420000-0x00007FF7B90BD000-memory.dmpFilesize
12.6MB
-
memory/1792-117-0x00007FF7B8420000-0x00007FF7B90BD000-memory.dmpFilesize
12.6MB
-
memory/1792-118-0x00007FF7B8420000-0x00007FF7B90BD000-memory.dmpFilesize
12.6MB
-
memory/1792-119-0x00007FF7B8420000-0x00007FF7B90BD000-memory.dmpFilesize
12.6MB