Resubmissions

30-11-2022 17:41

221130-v9ts7abe25 10

30-11-2022 17:10

221130-vp2nascf3s 9

General

  • Target

    0ecc20f2e5f96252997b16bf7b516a77b595bd480a050db2a6ca3b55eb56b53b

  • Size

    2.5MB

  • Sample

    221130-v9ts7abe25

  • MD5

    a001612855d4a8ef91a81fcc04c78923

  • SHA1

    852a3107921557748edd48175f5c14e9bd90d84a

  • SHA256

    0ecc20f2e5f96252997b16bf7b516a77b595bd480a050db2a6ca3b55eb56b53b

  • SHA512

    2dfdda74dff7a57d55ee36e9cc056f06410cc07bbd5f7bcf35efa525f1cc06108a9f3ad8015abe8e81cf8564b2b49ddc51568a1613673bf1f5e4f9d9f1091173

  • SSDEEP

    49152:GoTnBCUzCLIB8whjke0k3+DNufQFbwBUreGDs1wa3zUprbFLKxvT1t+IE:GPowXD/2GreGDsPoRLKx3hE

Malware Config

Targets

    • Target

      0ecc20f2e5f96252997b16bf7b516a77b595bd480a050db2a6ca3b55eb56b53b

    • Size

      2.5MB

    • MD5

      a001612855d4a8ef91a81fcc04c78923

    • SHA1

      852a3107921557748edd48175f5c14e9bd90d84a

    • SHA256

      0ecc20f2e5f96252997b16bf7b516a77b595bd480a050db2a6ca3b55eb56b53b

    • SHA512

      2dfdda74dff7a57d55ee36e9cc056f06410cc07bbd5f7bcf35efa525f1cc06108a9f3ad8015abe8e81cf8564b2b49ddc51568a1613673bf1f5e4f9d9f1091173

    • SSDEEP

      49152:GoTnBCUzCLIB8whjke0k3+DNufQFbwBUreGDs1wa3zUprbFLKxvT1t+IE:GPowXD/2GreGDsPoRLKx3hE

    • Modifies system executable filetype association

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Registers COM server for autorun

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

6
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

7
T1082

Peripheral Device Discovery

2
T1120

Tasks