Analysis
-
max time kernel
339s -
max time network
342s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23/09/2022, 09:07
Behavioral task
behavioral1
Sample
exfilty.exe
Resource
win7-20220812-en
6 signatures
600 seconds
Behavioral task
behavioral2
Sample
exfilty.exe
Resource
win10-20220812-en
6 signatures
600 seconds
General
-
Target
exfilty.exe
-
Size
3.7MB
-
MD5
6c2add46386dbda1ac0ae2f6fda7aa75
-
SHA1
fd410794cea5ba3ec4d4bf34015e55a7808a43e8
-
SHA256
0425a05ec76c206a8f63014ba5448757e6a11249f2aeae2ae5b92e6588156e46
-
SHA512
f745e707e7bff8dd3bc48fbed8b6f26c430618d30a93e5f6ced7170956629c8d0aa2277efd6f640284da7c9d97aec5d52091a53c8053a812d02f4a54673a4ad4
-
SSDEEP
98304:pO/xf14Sko0+3hyNYLOn926VLrM7ipJBqo55C:UO0RxyNY6LrMKBqom
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ exfilty.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion exfilty.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion exfilty.exe -
resource yara_rule behavioral1/memory/1928-54-0x000000013FC30000-0x0000000140615000-memory.dmp themida behavioral1/memory/1928-56-0x000000013FC30000-0x0000000140615000-memory.dmp themida behavioral1/memory/1928-58-0x000000013FC30000-0x0000000140615000-memory.dmp themida behavioral1/memory/1928-59-0x000000013FC30000-0x0000000140615000-memory.dmp themida behavioral1/memory/1928-67-0x000000013FC30000-0x0000000140615000-memory.dmp themida behavioral1/memory/1928-69-0x000000013FC30000-0x0000000140615000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA exfilty.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1928 exfilty.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1192 1928 exfilty.exe 27 PID 1928 wrote to memory of 1192 1928 exfilty.exe 27 PID 1928 wrote to memory of 1192 1928 exfilty.exe 27 PID 1192 wrote to memory of 616 1192 cmd.exe 28 PID 1192 wrote to memory of 616 1192 cmd.exe 28 PID 1192 wrote to memory of 616 1192 cmd.exe 28 PID 1192 wrote to memory of 1052 1192 cmd.exe 29 PID 1192 wrote to memory of 1052 1192 cmd.exe 29 PID 1192 wrote to memory of 1052 1192 cmd.exe 29 PID 1192 wrote to memory of 1080 1192 cmd.exe 30 PID 1192 wrote to memory of 1080 1192 cmd.exe 30 PID 1192 wrote to memory of 1080 1192 cmd.exe 30 PID 1928 wrote to memory of 944 1928 exfilty.exe 31 PID 1928 wrote to memory of 944 1928 exfilty.exe 31 PID 1928 wrote to memory of 944 1928 exfilty.exe 31 PID 1928 wrote to memory of 912 1928 exfilty.exe 32 PID 1928 wrote to memory of 912 1928 exfilty.exe 32 PID 1928 wrote to memory of 912 1928 exfilty.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\exfilty.exe"C:\Users\Admin\AppData\Local\Temp\exfilty.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\exfilty.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\exfilty.exe" MD53⤵PID:616
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:1052
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:1080
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:/You Like man :laugh: >nul 2>&12⤵PID:944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:912
-