Analysis
-
max time kernel
52s -
max time network
182s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
31/10/2022, 22:16
Behavioral task
behavioral1
Sample
24cac780158e82f1f07fd0f752d84b9e039296fbf08765230c98f89ea0cad142.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
24cac780158e82f1f07fd0f752d84b9e039296fbf08765230c98f89ea0cad142.exe
-
Size
5.5MB
-
MD5
81f14b336cea939b52ef0b8ebb6b8e80
-
SHA1
28755e6a8068fa7f9afd9f36c432e3d72d0378c3
-
SHA256
24cac780158e82f1f07fd0f752d84b9e039296fbf08765230c98f89ea0cad142
-
SHA512
0c435a3754cdcc495171842937c786ff20bbb7ba2f4bb665415a93ce1d0c596896756a289c1e62f8b4d9ce3e1d2bddb1e29c154487f5cae31e9300b72940ae2c
-
SSDEEP
98304:7sONGbKoZLqOPg/d6fpRSDVpX9cXbS/hRrk8wAgBa+nRm1FIar7j:4bKgLBKdQQWLS5RY8wAgBa+RQFIar7j
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 24cac780158e82f1f07fd0f752d84b9e039296fbf08765230c98f89ea0cad142.exe -
resource yara_rule behavioral2/memory/2580-120-0x0000000000D40000-0x0000000001BF5000-memory.dmp upx behavioral2/memory/2580-121-0x0000000000D40000-0x0000000001BF5000-memory.dmp upx behavioral2/memory/2580-123-0x0000000000D40000-0x0000000001BF5000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 24cac780158e82f1f07fd0f752d84b9e039296fbf08765230c98f89ea0cad142.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 24cac780158e82f1f07fd0f752d84b9e039296fbf08765230c98f89ea0cad142.exe -
resource yara_rule behavioral2/memory/2580-120-0x0000000000D40000-0x0000000001BF5000-memory.dmp themida behavioral2/memory/2580-121-0x0000000000D40000-0x0000000001BF5000-memory.dmp themida behavioral2/memory/2580-123-0x0000000000D40000-0x0000000001BF5000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 24cac780158e82f1f07fd0f752d84b9e039296fbf08765230c98f89ea0cad142.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2580 24cac780158e82f1f07fd0f752d84b9e039296fbf08765230c98f89ea0cad142.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24cac780158e82f1f07fd0f752d84b9e039296fbf08765230c98f89ea0cad142.exe"C:\Users\Admin\AppData\Local\Temp\24cac780158e82f1f07fd0f752d84b9e039296fbf08765230c98f89ea0cad142.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2580