Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-08-2022 12:37
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20220812-en
windows7-x64
6 signatures
150 seconds
General
-
Target
Setup.exe
-
Size
7.3MB
-
MD5
f1c967a3b91f3c7e6f64438cd5c08bd3
-
SHA1
cf6f14bf4c4a2458e290658e71238910c8b54f0d
-
SHA256
bbe77e8a2d371343b317688a63e5200f91e33038c80bddd82b418d85332784b8
-
SHA512
52b84257a7c199fe819ad2fea9e560b24310b382e9864d64885e7307134c4dbdd97cac7ad0e36042811623d8fd7842e68fbfdf52b5d1d975bf5c4420dd6f8d91
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Setup.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Setup.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe -
Processes:
resource yara_rule behavioral1/memory/880-55-0x000000013F4C0000-0x000000014085C000-memory.dmp themida behavioral1/memory/880-57-0x000000013F4C0000-0x000000014085C000-memory.dmp themida behavioral1/memory/880-58-0x000000013F4C0000-0x000000014085C000-memory.dmp themida behavioral1/memory/880-59-0x000000013F4C0000-0x000000014085C000-memory.dmp themida behavioral1/memory/880-60-0x000000013F4C0000-0x000000014085C000-memory.dmp themida behavioral1/memory/880-61-0x000000013F4C0000-0x000000014085C000-memory.dmp themida behavioral1/memory/880-62-0x000000013F4C0000-0x000000014085C000-memory.dmp themida behavioral1/memory/880-63-0x000000013F4C0000-0x000000014085C000-memory.dmp themida behavioral1/memory/880-64-0x000000013F4C0000-0x000000014085C000-memory.dmp themida behavioral1/memory/880-65-0x000000013F4C0000-0x000000014085C000-memory.dmp themida -
Processes:
Setup.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/880-58-0x000000013F4C0000-0x000000014085C000-memory.dmp autoit_exe behavioral1/memory/880-59-0x000000013F4C0000-0x000000014085C000-memory.dmp autoit_exe behavioral1/memory/880-60-0x000000013F4C0000-0x000000014085C000-memory.dmp autoit_exe behavioral1/memory/880-61-0x000000013F4C0000-0x000000014085C000-memory.dmp autoit_exe behavioral1/memory/880-62-0x000000013F4C0000-0x000000014085C000-memory.dmp autoit_exe behavioral1/memory/880-63-0x000000013F4C0000-0x000000014085C000-memory.dmp autoit_exe behavioral1/memory/880-64-0x000000013F4C0000-0x000000014085C000-memory.dmp autoit_exe behavioral1/memory/880-65-0x000000013F4C0000-0x000000014085C000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Setup.exepid process 880 Setup.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/880-54-0x000007FEFC521000-0x000007FEFC523000-memory.dmpFilesize
8KB
-
memory/880-55-0x000000013F4C0000-0x000000014085C000-memory.dmpFilesize
19.6MB
-
memory/880-56-0x0000000077CA0000-0x0000000077E49000-memory.dmpFilesize
1.7MB
-
memory/880-57-0x000000013F4C0000-0x000000014085C000-memory.dmpFilesize
19.6MB
-
memory/880-58-0x000000013F4C0000-0x000000014085C000-memory.dmpFilesize
19.6MB
-
memory/880-59-0x000000013F4C0000-0x000000014085C000-memory.dmpFilesize
19.6MB
-
memory/880-60-0x000000013F4C0000-0x000000014085C000-memory.dmpFilesize
19.6MB
-
memory/880-61-0x000000013F4C0000-0x000000014085C000-memory.dmpFilesize
19.6MB
-
memory/880-62-0x000000013F4C0000-0x000000014085C000-memory.dmpFilesize
19.6MB
-
memory/880-63-0x000000013F4C0000-0x000000014085C000-memory.dmpFilesize
19.6MB
-
memory/880-64-0x000000013F4C0000-0x000000014085C000-memory.dmpFilesize
19.6MB
-
memory/880-65-0x000000013F4C0000-0x000000014085C000-memory.dmpFilesize
19.6MB
-
memory/880-66-0x0000000077CA0000-0x0000000077E49000-memory.dmpFilesize
1.7MB