Resubmissions

26-09-2022 15:09

220926-sjlzjscchm 9

05-12-2021 07:55

211205-jscmsscbeq 10

Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    26-09-2022 15:09

General

  • Target

    SysLogsService.exe

  • Size

    7.7MB

  • MD5

    0b97fa8b682939e55df2bcfe3d17dba5

  • SHA1

    9d0101a59a1f705d55ab5acb0577ea9a967a6bab

  • SHA256

    ef7fefcb41d79c824c429819fbe73e6d0186c0586bc5f031debf553cd43edce4

  • SHA512

    1d4e414a9abd9b4f317f4ea37fc2a76ee8d3057b5079f654c142ef0b938433d0c52f8620526375eed4b9ac0adceda26484ebad9e63b7c4df5aef272d07620e68

  • SSDEEP

    49152:w8eti2sIHTdUoWj/QPNYtS5Djcdv9TS32PkEh77sD2qz4DfvcbXyWrhIqJwH1iL3:fWiPIZZXaMD8Vm2P572xEqY5Xu

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SysLogsService.exe
    "C:\Users\Admin\AppData\Local\Temp\SysLogsService.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1200

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1200-54-0x000000013F4B0000-0x000000013FC68000-memory.dmp
    Filesize

    7.7MB

  • memory/1200-55-0x0000000077780000-0x0000000077929000-memory.dmp
    Filesize

    1.7MB

  • memory/1200-56-0x000000013F4B0000-0x000000013FC68000-memory.dmp
    Filesize

    7.7MB

  • memory/1200-57-0x000000013F4B0000-0x000000013FC68000-memory.dmp
    Filesize

    7.7MB

  • memory/1200-58-0x0000000077780000-0x0000000077929000-memory.dmp
    Filesize

    1.7MB