Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 22:36
Static task
static1
Behavioral task
behavioral1
Sample
d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe
Resource
win7-20220718-en
General
-
Target
d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe
-
Size
1.6MB
-
MD5
27eff943a9a321407709d92ef5f99667
-
SHA1
1c6a9de56ae6db79d1ade91876baeda42c0d3819
-
SHA256
d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511
-
SHA512
f43a9781e3148105682237897682dd8f289fb4cbb1f21e4e329ece0d04ee0f903a6f664cd7fa5a3d9ccdcbfe96ba37e5d79e909fc84b12ba426dcf03024590f3
Malware Config
Extracted
buer
https://loddd01.info/
https://loddd02.info/
Signatures
-
resource yara_rule behavioral1/memory/1668-54-0x000000003F960000-0x000000003FD99000-memory.dmp buer behavioral1/memory/1668-56-0x000000003F960000-0x000000003FD99000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Wine d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1668 d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1668 d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe"C:\Users\Admin\AppData\Local\Temp\d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1668