Analysis
-
max time kernel
32s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 18:12
Behavioral task
behavioral1
Sample
Emiditor.exe
Resource
win7-20220812-en
windows7-x64
9 signatures
150 seconds
General
-
Target
Emiditor.exe
-
Size
8.1MB
-
MD5
e08805d6085d6402dcaeb253e4375a09
-
SHA1
2c79a1203c135aa1a7d5fbed566c94983278b40c
-
SHA256
b559413c43d76b67e8b068c842a0a615b04d6d687be860e18da1adc43dfe5b5e
-
SHA512
517d723f46c11a10eb303d655ffca77b1bc3f863450208e659cfea70276f15a7d921d52c04597d035faebb7278e66ff55bbb45b451568f11bc176650bd149db9
-
SSDEEP
98304:iFBz9bmxmtOfP7TI/OKIdSOwSmGrjvvLYq5dkcDNckgHDJHZt:qBzQxmtOfzsWKgwS1jvvH5uFHn
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Emiditor.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Emiditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Emiditor.exe -
resource yara_rule behavioral1/memory/1708-56-0x0000000000890000-0x00000000010B0000-memory.dmp themida behavioral1/memory/1708-57-0x0000000000890000-0x00000000010B0000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Emiditor.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1708 Emiditor.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 864 1708 WerFault.exe 25 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1708 Emiditor.exe 1708 Emiditor.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1708 Emiditor.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1708 wrote to memory of 864 1708 Emiditor.exe 26 PID 1708 wrote to memory of 864 1708 Emiditor.exe 26 PID 1708 wrote to memory of 864 1708 Emiditor.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\Emiditor.exe"C:\Users\Admin\AppData\Local\Temp\Emiditor.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1708 -s 5962⤵
- Program crash
PID:864
-