Analysis
-
max time kernel
54s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 18:24
Behavioral task
behavioral1
Sample
Emiditor.exe
Resource
win7-20220812-en
windows7-x64
9 signatures
150 seconds
General
-
Target
Emiditor.exe
-
Size
8.1MB
-
MD5
e08805d6085d6402dcaeb253e4375a09
-
SHA1
2c79a1203c135aa1a7d5fbed566c94983278b40c
-
SHA256
b559413c43d76b67e8b068c842a0a615b04d6d687be860e18da1adc43dfe5b5e
-
SHA512
517d723f46c11a10eb303d655ffca77b1bc3f863450208e659cfea70276f15a7d921d52c04597d035faebb7278e66ff55bbb45b451568f11bc176650bd149db9
-
SSDEEP
98304:iFBz9bmxmtOfP7TI/OKIdSOwSmGrjvvLYq5dkcDNckgHDJHZt:qBzQxmtOfzsWKgwS1jvvH5uFHn
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Emiditor.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Emiditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Emiditor.exe -
resource yara_rule behavioral1/memory/1368-54-0x0000000000D00000-0x0000000001520000-memory.dmp themida behavioral1/memory/1368-55-0x0000000000D00000-0x0000000001520000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Emiditor.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1368 Emiditor.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1652 1368 WerFault.exe 26 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1368 Emiditor.exe 1368 Emiditor.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1368 Emiditor.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1652 1368 Emiditor.exe 28 PID 1368 wrote to memory of 1652 1368 Emiditor.exe 28 PID 1368 wrote to memory of 1652 1368 Emiditor.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Emiditor.exe"C:\Users\Admin\AppData\Local\Temp\Emiditor.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1368 -s 6002⤵
- Program crash
PID:1652
-