Resubmissions
19/09/2022, 20:56
220919-zq94aachaj 919/09/2022, 20:53
220919-zpr63scgcq 919/09/2022, 20:46
220919-zkhrvahaa7 9Analysis
-
max time kernel
36s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 20:56
Behavioral task
behavioral1
Sample
Vult.exe
Resource
win7-20220901-en
6 signatures
150 seconds
General
-
Target
Vult.exe
-
Size
3.7MB
-
MD5
c6079d727ab3a2fa6401f124c3eae974
-
SHA1
8bb4214f74b91f02e99c0ee84b6efaeee25ba8ab
-
SHA256
941882cbfe48b088fff514c571f0808206d341ac9bd667b29047eb9596540193
-
SHA512
4e571d3168189177221213c6877d04e9c39505ecbb967afa18377b29bbe8ec2c05ad7efe57d1b9d5967c4c448feff14a67b967c6cf85f5c9161d25c55c95ae0e
-
SSDEEP
98304:qUAtPY8eAwqmISy/CsGWPF+e8AnmLpr97eK3:NAt0AwqmI1/dPfnmT7d
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Vult.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Vult.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Vult.exe -
resource yara_rule behavioral1/memory/1448-54-0x000000013F530000-0x000000013FF1F000-memory.dmp themida behavioral1/memory/1448-55-0x000000013F530000-0x000000013FF1F000-memory.dmp themida behavioral1/memory/1448-56-0x000000013F530000-0x000000013FF1F000-memory.dmp themida behavioral1/memory/1448-57-0x000000013F530000-0x000000013FF1F000-memory.dmp themida behavioral1/memory/1448-66-0x000000013F530000-0x000000013FF1F000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Vult.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1448 Vult.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1448 wrote to memory of 820 1448 Vult.exe 28 PID 1448 wrote to memory of 820 1448 Vult.exe 28 PID 1448 wrote to memory of 820 1448 Vult.exe 28 PID 820 wrote to memory of 960 820 cmd.exe 29 PID 820 wrote to memory of 960 820 cmd.exe 29 PID 820 wrote to memory of 960 820 cmd.exe 29 PID 820 wrote to memory of 1532 820 cmd.exe 30 PID 820 wrote to memory of 1532 820 cmd.exe 30 PID 820 wrote to memory of 1532 820 cmd.exe 30 PID 820 wrote to memory of 1412 820 cmd.exe 31 PID 820 wrote to memory of 1412 820 cmd.exe 31 PID 820 wrote to memory of 1412 820 cmd.exe 31 PID 1448 wrote to memory of 528 1448 Vult.exe 32 PID 1448 wrote to memory of 528 1448 Vult.exe 32 PID 1448 wrote to memory of 528 1448 Vult.exe 32 PID 1448 wrote to memory of 524 1448 Vult.exe 33 PID 1448 wrote to memory of 524 1448 Vult.exe 33 PID 1448 wrote to memory of 524 1448 Vult.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Vult.exe"C:\Users\Admin\AppData\Local\Temp\Vult.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Vult.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Vult.exe" MD53⤵PID:960
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:1532
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:1412
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:/You Like man :laugh: >nul 2>&12⤵PID:528
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:524
-