Analysis
-
max time kernel
99s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2022, 06:49
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
10 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
9.1MB
-
MD5
f57290a3fb2a9714e880f92a4ee1f22a
-
SHA1
25249086768b072a7f0649ab9fb60fa4e3eb95b6
-
SHA256
b3c506f89220c76008795fdb56d670380ab58d952065c891f75a8db54b84ef8e
-
SHA512
320bec079deeb6b91b9ba6ac868ed4af235ae863df6e3bc22b7aeba24b90ec1f78aa0c07d4497bc599448bd90f56f8c627c8c064419ab3f2293222c04cf1a9a8
-
SSDEEP
196608:puiEfVsQ+P5VBqvpxTle/y89BcDmwIuAOie1M:pdrnUvTm9BcDm/T
Malware Config
Extracted
Family
systembc
C2
89.22.225.242:4193
195.2.93.22:4193
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ tmp.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ tmp.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tmp.exe -
resource yara_rule behavioral2/memory/4744-132-0x0000000000400000-0x0000000000D1F000-memory.dmp themida behavioral2/memory/4744-135-0x0000000000400000-0x0000000000D1F000-memory.dmp themida behavioral2/memory/4760-143-0x0000000000400000-0x0000000000D1F000-memory.dmp themida behavioral2/memory/4760-147-0x0000000000400000-0x0000000000D1F000-memory.dmp themida behavioral2/memory/4744-155-0x0000000000400000-0x0000000000D1F000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tmp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tmp.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\wow64.job tmp.exe File opened for modification C:\Windows\Tasks\wow64.job tmp.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4744 tmp.exe 4744 tmp.exe 4744 tmp.exe 4744 tmp.exe 4744 tmp.exe 4744 tmp.exe 4744 tmp.exe 4744 tmp.exe 4744 tmp.exe 4744 tmp.exe 4760 tmp.exe 4760 tmp.exe 4760 tmp.exe 4760 tmp.exe 4760 tmp.exe 4760 tmp.exe 4760 tmp.exe 4760 tmp.exe 4760 tmp.exe 4760 tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe start1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4760