Analysis
-
max time kernel
96s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2022 12:37
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20220812-en
windows7-x64
6 signatures
150 seconds
General
-
Target
Setup.exe
-
Size
7.3MB
-
MD5
f1c967a3b91f3c7e6f64438cd5c08bd3
-
SHA1
cf6f14bf4c4a2458e290658e71238910c8b54f0d
-
SHA256
bbe77e8a2d371343b317688a63e5200f91e33038c80bddd82b418d85332784b8
-
SHA512
52b84257a7c199fe819ad2fea9e560b24310b382e9864d64885e7307134c4dbdd97cac7ad0e36042811623d8fd7842e68fbfdf52b5d1d975bf5c4420dd6f8d91
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Setup.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Setup.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup.exe -
Processes:
resource yara_rule behavioral2/memory/4888-132-0x00007FF6AECC0000-0x00007FF6B005C000-memory.dmp themida behavioral2/memory/4888-134-0x00007FF6AECC0000-0x00007FF6B005C000-memory.dmp themida behavioral2/memory/4888-135-0x00007FF6AECC0000-0x00007FF6B005C000-memory.dmp themida behavioral2/memory/4888-136-0x00007FF6AECC0000-0x00007FF6B005C000-memory.dmp themida behavioral2/memory/4888-137-0x00007FF6AECC0000-0x00007FF6B005C000-memory.dmp themida behavioral2/memory/4888-138-0x00007FF6AECC0000-0x00007FF6B005C000-memory.dmp themida behavioral2/memory/4888-139-0x00007FF6AECC0000-0x00007FF6B005C000-memory.dmp themida behavioral2/memory/4888-140-0x00007FF6AECC0000-0x00007FF6B005C000-memory.dmp themida behavioral2/memory/4888-141-0x00007FF6AECC0000-0x00007FF6B005C000-memory.dmp themida behavioral2/memory/4888-142-0x00007FF6AECC0000-0x00007FF6B005C000-memory.dmp themida -
Processes:
Setup.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4888-135-0x00007FF6AECC0000-0x00007FF6B005C000-memory.dmp autoit_exe behavioral2/memory/4888-136-0x00007FF6AECC0000-0x00007FF6B005C000-memory.dmp autoit_exe behavioral2/memory/4888-137-0x00007FF6AECC0000-0x00007FF6B005C000-memory.dmp autoit_exe behavioral2/memory/4888-138-0x00007FF6AECC0000-0x00007FF6B005C000-memory.dmp autoit_exe behavioral2/memory/4888-139-0x00007FF6AECC0000-0x00007FF6B005C000-memory.dmp autoit_exe behavioral2/memory/4888-140-0x00007FF6AECC0000-0x00007FF6B005C000-memory.dmp autoit_exe behavioral2/memory/4888-141-0x00007FF6AECC0000-0x00007FF6B005C000-memory.dmp autoit_exe behavioral2/memory/4888-142-0x00007FF6AECC0000-0x00007FF6B005C000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Setup.exepid process 4888 Setup.exe