Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/10/2022, 13:53

General

  • Target

    launcher (49).exe

  • Size

    12.7MB

  • MD5

    ac5fb6e666552f53157f00f02025dfb9

  • SHA1

    9941f28600126a3a8a0154fa5dfaf67e0ca1e4bd

  • SHA256

    f3c8751139eff64cfcb4ed5abee0461366af33fc53a450b076e1f25ef42a2515

  • SHA512

    1a1891df24c1f2bf2ea10f19fa464ba45e396687ffed282ecf583178e715261b60e420944aa9f00c0a75ea63a9403904ad23bbb779f82f7cf4417aeef62c4ebd

  • SSDEEP

    196608:OZzRHfnzqg/Y7m2bjjrqNYppO/+9EFYzQQZ:OZztzqE0bjjrqNoEpCDZ

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • NTFS ADS 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\launcher (49).exe
    "C:\Users\Admin\AppData\Local\Temp\launcher (49).exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • NTFS ADS
    PID:4356

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4356-132-0x00007FF6A2650000-0x00007FF6A35A7000-memory.dmp

    Filesize

    15.3MB

  • memory/4356-133-0x00007FF6A2650000-0x00007FF6A35A7000-memory.dmp

    Filesize

    15.3MB

  • memory/4356-134-0x00007FFC36130000-0x00007FFC36325000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-135-0x00007FF6A2650000-0x00007FF6A35A7000-memory.dmp

    Filesize

    15.3MB

  • memory/4356-136-0x00007FFC36130000-0x00007FFC36325000-memory.dmp

    Filesize

    2.0MB