Resubmissions

26-09-2022 15:09

220926-sjlzjscchm 9

05-12-2021 07:55

211205-jscmsscbeq 10

Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-09-2022 15:09

General

  • Target

    SysLogsService.exe

  • Size

    7.7MB

  • MD5

    0b97fa8b682939e55df2bcfe3d17dba5

  • SHA1

    9d0101a59a1f705d55ab5acb0577ea9a967a6bab

  • SHA256

    ef7fefcb41d79c824c429819fbe73e6d0186c0586bc5f031debf553cd43edce4

  • SHA512

    1d4e414a9abd9b4f317f4ea37fc2a76ee8d3057b5079f654c142ef0b938433d0c52f8620526375eed4b9ac0adceda26484ebad9e63b7c4df5aef272d07620e68

  • SSDEEP

    49152:w8eti2sIHTdUoWj/QPNYtS5Djcdv9TS32PkEh77sD2qz4DfvcbXyWrhIqJwH1iL3:fWiPIZZXaMD8Vm2P572xEqY5Xu

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SysLogsService.exe
    "C:\Users\Admin\AppData\Local\Temp\SysLogsService.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:4760

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4760-132-0x00007FF730DC0000-0x00007FF731578000-memory.dmp
    Filesize

    7.7MB

  • memory/4760-133-0x00007FFB34B90000-0x00007FFB34D85000-memory.dmp
    Filesize

    2.0MB

  • memory/4760-134-0x00007FF730DC0000-0x00007FF731578000-memory.dmp
    Filesize

    7.7MB

  • memory/4760-135-0x00007FF730DC0000-0x00007FF731578000-memory.dmp
    Filesize

    7.7MB

  • memory/4760-136-0x00007FFB34B90000-0x00007FFB34D85000-memory.dmp
    Filesize

    2.0MB