Analysis

  • max time kernel
    23s
  • max time network
    28s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-10-2022 14:47

Errors

Reason
Machine shutdown

General

  • Target

    bobux.exe

  • Size

    5.4MB

  • MD5

    6afa9397a7cd80ffe2f8d30828269e36

  • SHA1

    c7976bb175b4d26cc790f925280551a7fcecfff1

  • SHA256

    3699750883e4c662d50fed7b6d16b8c515d52ad14edf54f6b7183d419e646448

  • SHA512

    de139d2dd1d569b48b6bb79098ed0198771c3187ae0dae8171ab5a89287492711bd712eb432fb822128df0694820e97161a712ddc4e6dd264d2ec30b3b44b230

  • SSDEEP

    98304:NxV6zRhld9E1BlYb9uto2jgrGeweoSYp2prwvLWaNFXvow17IugzlHbGSZBN7fZm:vV8ld98BlON2jnbNswvBXvowJgzl7GSO

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 3 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • System policy modification 1 TTPs 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bobux.exe
    "C:\Users\Admin\AppData\Local\Temp\bobux.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • System policy modification
    PID:4948
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa398f055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:788

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

3
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\322ea8b2-5b77-44ff-8f35-2130db963898\AgileDotNetRT64.dll
    Filesize

    3.1MB

    MD5

    4d8082b3de02f82db9a515e9dab5d2b6

    SHA1

    057a20ade70244601d0fe50f7011c95bae335ea5

    SHA256

    936b1537b6efcece032c05661238b06beefc61ff76e82b7c5d9fe558a9360a4c

    SHA512

    7b9153e9948e0f911fcb0b145678a56cac4abd948fa99e07c331760f02dce096cf3be7d2d8493cf7a76460c7172e24eaa45c1283a28353501b2876c54752c60d

  • memory/4948-132-0x000002AC87210000-0x000002AC87776000-memory.dmp
    Filesize

    5.4MB

  • memory/4948-133-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp
    Filesize

    10.8MB

  • memory/4948-135-0x00007FFBC4E30000-0x00007FFBC569C000-memory.dmp
    Filesize

    8.4MB

  • memory/4948-136-0x00007FFBC9AA0000-0x00007FFBC9BEE000-memory.dmp
    Filesize

    1.3MB

  • memory/4948-137-0x00007FFBC4E30000-0x00007FFBC569C000-memory.dmp
    Filesize

    8.4MB

  • memory/4948-138-0x00007FFBE72D0000-0x00007FFBE74C5000-memory.dmp
    Filesize

    2.0MB

  • memory/4948-139-0x00007FFBC4E30000-0x00007FFBC569C000-memory.dmp
    Filesize

    8.4MB

  • memory/4948-140-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp
    Filesize

    10.8MB

  • memory/4948-141-0x00007FFBE72D0000-0x00007FFBE74C5000-memory.dmp
    Filesize

    2.0MB