Analysis
-
max time kernel
165s -
max time network
180s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
23/09/2022, 09:07
Behavioral task
behavioral1
Sample
exfilty.exe
Resource
win7-20220812-en
6 signatures
600 seconds
Behavioral task
behavioral2
Sample
exfilty.exe
Resource
win10-20220812-en
6 signatures
600 seconds
General
-
Target
exfilty.exe
-
Size
3.7MB
-
MD5
6c2add46386dbda1ac0ae2f6fda7aa75
-
SHA1
fd410794cea5ba3ec4d4bf34015e55a7808a43e8
-
SHA256
0425a05ec76c206a8f63014ba5448757e6a11249f2aeae2ae5b92e6588156e46
-
SHA512
f745e707e7bff8dd3bc48fbed8b6f26c430618d30a93e5f6ced7170956629c8d0aa2277efd6f640284da7c9d97aec5d52091a53c8053a812d02f4a54673a4ad4
-
SSDEEP
98304:pO/xf14Sko0+3hyNYLOn926VLrM7ipJBqo55C:UO0RxyNY6LrMKBqom
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ exfilty.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion exfilty.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion exfilty.exe -
resource yara_rule behavioral2/memory/2960-117-0x00007FF6E2E20000-0x00007FF6E3805000-memory.dmp themida behavioral2/memory/2960-116-0x00007FF6E2E20000-0x00007FF6E3805000-memory.dmp themida behavioral2/memory/2960-118-0x00007FF6E2E20000-0x00007FF6E3805000-memory.dmp themida behavioral2/memory/2960-120-0x00007FF6E2E20000-0x00007FF6E3805000-memory.dmp themida behavioral2/memory/2960-121-0x00007FF6E2E20000-0x00007FF6E3805000-memory.dmp themida behavioral2/memory/2960-128-0x00007FF6E2E20000-0x00007FF6E3805000-memory.dmp themida behavioral2/memory/2960-131-0x00007FF6E2E20000-0x00007FF6E3805000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA exfilty.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2960 exfilty.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2960 wrote to memory of 4100 2960 exfilty.exe 67 PID 2960 wrote to memory of 4100 2960 exfilty.exe 67 PID 4100 wrote to memory of 4872 4100 cmd.exe 70 PID 4100 wrote to memory of 4872 4100 cmd.exe 70 PID 4100 wrote to memory of 4884 4100 cmd.exe 69 PID 4100 wrote to memory of 4884 4100 cmd.exe 69 PID 4100 wrote to memory of 4612 4100 cmd.exe 68 PID 4100 wrote to memory of 4612 4100 cmd.exe 68 PID 2960 wrote to memory of 2392 2960 exfilty.exe 71 PID 2960 wrote to memory of 2392 2960 exfilty.exe 71 PID 2960 wrote to memory of 4900 2960 exfilty.exe 72 PID 2960 wrote to memory of 4900 2960 exfilty.exe 72 PID 2960 wrote to memory of 4960 2960 exfilty.exe 73 PID 2960 wrote to memory of 4960 2960 exfilty.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\exfilty.exe"C:\Users\Admin\AppData\Local\Temp\exfilty.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\exfilty.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:4612
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:4884
-
-
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\exfilty.exe" MD53⤵PID:4872
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:/You Like man :laugh: >nul 2>&12⤵PID:2392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4960
-