Analysis

  • max time kernel
    138s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    04-07-2022 14:54

General

  • Target

    69b17d0f9389404a1228d310198b33e9.exe

  • Size

    2.9MB

  • MD5

    69b17d0f9389404a1228d310198b33e9

  • SHA1

    d70d61353e3ce850e6891623336ebdab931d5530

  • SHA256

    28920de5f1a16d20eb01e17bee84c2144eefa938bf0653e4165e3ff18b9244cc

  • SHA512

    6e4523f25ac22c39e3f942646ab85677cb65b367dc28e30d2e2cf69fe23692f160708afcfd9b31f3f85cae7f87eccd7c96a7fedcd30c23b0e768fd40b6012af8

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69b17d0f9389404a1228d310198b33e9.exe
    "C:\Users\Admin\AppData\Local\Temp\69b17d0f9389404a1228d310198b33e9.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    PID:1528

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1528-54-0x0000000075C51000-0x0000000075C53000-memory.dmp
    Filesize

    8KB

  • memory/1528-55-0x0000000001080000-0x0000000001792000-memory.dmp
    Filesize

    7.1MB

  • memory/1528-57-0x0000000001080000-0x0000000001792000-memory.dmp
    Filesize

    7.1MB

  • memory/1528-58-0x0000000077D40000-0x0000000077EC0000-memory.dmp
    Filesize

    1.5MB

  • memory/1528-59-0x0000000001080000-0x0000000001792000-memory.dmp
    Filesize

    7.1MB