Analysis

  • max time kernel
    4s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/12/2022, 17:57

General

  • Target

    GooglePremiun.exe

  • Size

    5.4MB

  • MD5

    2c4dcb97d35e145c1fd6dd464a59c3f3

  • SHA1

    f0bbdd8f987501355e314a373d2ad59fd4c415f0

  • SHA256

    4e134ea499396ea639191c9d43133b11f3a3f7beec98438f0d5174cf24b730ff

  • SHA512

    2d3149cb249efc432e2254bdff01ae71856d360e73bd870a616f39ada27c3c9846c59f42b9f8258e11682ec7cba63e1509e43a78b919c1de87bc9ae935d259d6

  • SSDEEP

    98304:zunUYfEDuqky47DZUdtd6pVsi5JsavYh0VKVSI5aFZE2V5pSuwo6ZdfK4sDgwa:SUsTkiD2dtSIavYqI0I5cZfXpHx6ZT

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GooglePremiun.exe
    "C:\Users\Admin\AppData\Local\Temp\GooglePremiun.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1500

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1500-54-0x0000000075B41000-0x0000000075B43000-memory.dmp

          Filesize

          8KB

        • memory/1500-55-0x0000000000970000-0x0000000001A77000-memory.dmp

          Filesize

          17.0MB

        • memory/1500-56-0x0000000000970000-0x0000000001A77000-memory.dmp

          Filesize

          17.0MB

        • memory/1500-58-0x00000000778D0000-0x0000000077A50000-memory.dmp

          Filesize

          1.5MB

        • memory/1500-57-0x0000000000970000-0x0000000001A77000-memory.dmp

          Filesize

          17.0MB

        • memory/1500-59-0x0000000000970000-0x0000000001A77000-memory.dmp

          Filesize

          17.0MB

        • memory/1500-60-0x0000000000970000-0x0000000001A77000-memory.dmp

          Filesize

          17.0MB

        • memory/1500-61-0x0000000000970000-0x0000000001A77000-memory.dmp

          Filesize

          17.0MB

        • memory/1500-62-0x0000000000970000-0x0000000001A77000-memory.dmp

          Filesize

          17.0MB