Analysis
-
max time kernel
208s -
max time network
214s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 16:27
Behavioral task
behavioral1
Sample
v2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
v2.exe
Resource
win10v2004-20221111-en
General
-
Target
v2.exe
-
Size
8.2MB
-
MD5
396eb05ac1e4ece13243280b2c69c85b
-
SHA1
721db11d80b91c5a826114b7bfae73de43029e70
-
SHA256
6fd08847eca136b3099d476c9c78600a88aaaed6378f411b955b281908a75fac
-
SHA512
f03ca5330751685e42f3ebf7f36ae7a01329361d2cbccf4a1bb653e6c122a1ac88f3565c09480ac030d57f9a6e2630ea76a362b2c2af2b04fc9272bb2408943e
-
SSDEEP
196608:Xs8AtIGFmr/pOhL18xzIzaVT8x+1vNc9Eh9J1Ap4I:8pIGUYhLtmc2vNc9El1g4
Malware Config
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
ElysiumStealer Support DLL 1 IoCs
Processes:
resource yara_rule behavioral2/files/0x000b000000023160-140.dat elysiumstealer_dll -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
v2.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v2.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
v2.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions v2.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
v2.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools v2.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
v2.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v2.exe -
Loads dropped DLL 1 IoCs
Processes:
v2.exepid Process 1844 v2.exe -
Processes:
resource yara_rule behavioral2/memory/1844-138-0x0000000000040000-0x0000000001390000-memory.dmp themida behavioral2/memory/1844-139-0x0000000000040000-0x0000000001390000-memory.dmp themida -
Processes:
v2.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA v2.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
v2.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum v2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 v2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
v2.exepid Process 1844 v2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
v2.exepid Process 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe 1844 v2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
v2.exedescription pid Process Token: SeDebugPrivilege 1844 v2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\v2.exe"C:\Users\Admin\AppData\Local\Temp\v2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD594173de2e35aa8d621fc1c4f54b2a082
SHA1fbb2266ee47f88462560f0370edb329554cd5869
SHA2567e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f
SHA512cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798