Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-08-2022 04:09
Behavioral task
behavioral1
Sample
fc4636fad3407adafdd1c354be765cb8.exe
Resource
win7-20220812-en
windows7-x64
5 signatures
150 seconds
General
-
Target
fc4636fad3407adafdd1c354be765cb8.exe
-
Size
4.0MB
-
MD5
fc4636fad3407adafdd1c354be765cb8
-
SHA1
d03c44676a35c6d8b66a9980620369801c487fc1
-
SHA256
798a73227869f741dfef2febcb8180d71d1748a8f8002097d72f2af0bdad753d
-
SHA512
df311df357788daab81d3ee40eac392e73da0f406bb11b441c85da04ce2ef2fa1692cea13e318e267594324e8200409206f675a56407e3c7167b8d40b67c2774
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
fc4636fad3407adafdd1c354be765cb8.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fc4636fad3407adafdd1c354be765cb8.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
fc4636fad3407adafdd1c354be765cb8.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fc4636fad3407adafdd1c354be765cb8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fc4636fad3407adafdd1c354be765cb8.exe -
Processes:
resource yara_rule behavioral1/memory/1064-54-0x000000013F040000-0x000000013FAB7000-memory.dmp themida behavioral1/memory/1064-55-0x000000013F040000-0x000000013FAB7000-memory.dmp themida behavioral1/memory/1064-57-0x000000013F040000-0x000000013FAB7000-memory.dmp themida behavioral1/memory/1064-56-0x000000013F040000-0x000000013FAB7000-memory.dmp themida behavioral1/memory/1064-58-0x000000013F040000-0x000000013FAB7000-memory.dmp themida behavioral1/memory/1064-60-0x000000013F040000-0x000000013FAB7000-memory.dmp themida behavioral1/memory/1064-61-0x000000013F040000-0x000000013FAB7000-memory.dmp themida -
Processes:
fc4636fad3407adafdd1c354be765cb8.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fc4636fad3407adafdd1c354be765cb8.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
fc4636fad3407adafdd1c354be765cb8.exepid process 1064 fc4636fad3407adafdd1c354be765cb8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc4636fad3407adafdd1c354be765cb8.exe"C:\Users\Admin\AppData\Local\Temp\fc4636fad3407adafdd1c354be765cb8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1064