Malware Analysis Report

2024-08-06 08:28

Sample ID 221206-tyedpadf54
Target v2.exe
SHA256 6fd08847eca136b3099d476c9c78600a88aaaed6378f411b955b281908a75fac
Tags
themida elysiumstealer evasion stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

6fd08847eca136b3099d476c9c78600a88aaaed6378f411b955b281908a75fac

Threat Level: Known bad

The file v2.exe was found to be: Known bad.

Malicious Activity Summary

themida elysiumstealer evasion stealer trojan

ElysiumStealer Support DLL

ElysiumStealer

Looks for VirtualBox Guest Additions in registry

Identifies VirtualBox via ACPI registry values (likely anti-VM)

Looks for VMWare Tools registry key

Checks BIOS information in registry

Themida packer

Loads dropped DLL

Maps connected drives based on registry

Checks whether UAC is enabled

Suspicious use of NtSetInformationThreadHideFromDebugger

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK Matrix V6

Analysis: static1

Detonation Overview

Reported

2022-12-06 16:27

Signatures

Themida packer

themida
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-12-06 16:27

Reported

2022-12-06 16:32

Platform

win7-20221111-en

Max time kernel

72s

Max time network

34s

Command Line

"C:\Users\Admin\AppData\Local\Temp\v2.exe"

Signatures

Themida packer

themida
Description Indicator Process Target
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\v2.exe

"C:\Users\Admin\AppData\Local\Temp\v2.exe"

Network

N/A

Files

memory/1184-54-0x0000000000A70000-0x0000000001DC0000-memory.dmp

memory/1184-56-0x0000000000A70000-0x0000000001DC0000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-12-06 16:27

Reported

2022-12-06 16:32

Platform

win10v2004-20221111-en

Max time kernel

208s

Max time network

214s

Command Line

"C:\Users\Admin\AppData\Local\Temp\v2.exe"

Signatures

ElysiumStealer

stealer elysiumstealer

ElysiumStealer Support DLL

Description Indicator Process Target
N/A N/A N/A N/A

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\v2.exe N/A

Looks for VirtualBox Guest Additions in registry

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions C:\Users\Admin\AppData\Local\Temp\v2.exe N/A

Looks for VMWare Tools registry key

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools C:\Users\Admin\AppData\Local\Temp\v2.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\v2.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A

Themida packer

themida
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\v2.exe N/A

Maps connected drives based on registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Users\Admin\AppData\Local\Temp\v2.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\v2.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\v2.exe

"C:\Users\Admin\AppData\Local\Temp\v2.exe"

Network

Country Destination Domain Proto
N/A 13.107.4.50:80 tcp
N/A 13.107.4.50:80 tcp
N/A 52.168.117.169:443 tcp
N/A 104.80.225.205:443 tcp
N/A 87.248.202.1:80 tcp
N/A 87.248.202.1:80 tcp
N/A 13.107.4.50:80 tcp
N/A 40.77.2.164:443 tcp
N/A 8.8.8.8:53 15.89.54.20.in-addr.arpa udp

Files

memory/1844-132-0x0000000000040000-0x0000000001390000-memory.dmp

memory/1844-133-0x0000000000040000-0x0000000001390000-memory.dmp

memory/1844-137-0x0000000077120000-0x00000000772C3000-memory.dmp

memory/1844-138-0x0000000000040000-0x0000000001390000-memory.dmp

memory/1844-139-0x0000000000040000-0x0000000001390000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Runtime.MSIL.1.0.0.0\NativePRo.dll

MD5 94173de2e35aa8d621fc1c4f54b2a082
SHA1 fbb2266ee47f88462560f0370edb329554cd5869
SHA256 7e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f
SHA512 cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798

memory/1844-141-0x0000000006C20000-0x00000000071C4000-memory.dmp

memory/1844-142-0x0000000006670000-0x0000000006702000-memory.dmp

memory/1844-143-0x0000000006560000-0x0000000006572000-memory.dmp

memory/1844-144-0x00000000073D0000-0x0000000007436000-memory.dmp

memory/1844-145-0x0000000077120000-0x00000000772C3000-memory.dmp