Analysis
-
max time kernel
51s -
max time network
178s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
14-01-2023 22:17
Behavioral task
behavioral1
Sample
48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe
Resource
win7-20221111-en
windows7-x64
7 signatures
300 seconds
General
-
Target
48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe
-
Size
3.8MB
-
MD5
12d16c90620269cc665ce370dbe15784
-
SHA1
72fa84e606ee749844143e5904c14975e2d5d98c
-
SHA256
48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4
-
SHA512
aa0d992d1c9353a79d3d7984b1031b950b4022850c164ef6453f65de680f8d8d7b5d389feae2f494cde8403b7af000a3a90b78b19de36f23594db31b2ab74b67
-
SSDEEP
98304:aLa6vbZldIleZXkleKgxYC+ywWj5fr1018mHXM:aLa6vbZlmleZX7KAYCuWjhr12u
Malware Config
Extracted
Family
laplas
C2
45.159.189.105
Attributes
-
api_key
7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe -
resource yara_rule behavioral2/memory/5004-121-0x0000000000280000-0x0000000000C52000-memory.dmp themida behavioral2/memory/5004-148-0x0000000000280000-0x0000000000C52000-memory.dmp themida behavioral2/memory/5004-149-0x0000000000280000-0x0000000000C52000-memory.dmp themida behavioral2/memory/5004-150-0x0000000000280000-0x0000000000C52000-memory.dmp themida behavioral2/memory/5004-151-0x0000000000280000-0x0000000000C52000-memory.dmp themida behavioral2/memory/5004-152-0x0000000000280000-0x0000000000C52000-memory.dmp themida behavioral2/memory/5004-153-0x0000000000280000-0x0000000000C52000-memory.dmp themida behavioral2/memory/5004-154-0x0000000000280000-0x0000000000C52000-memory.dmp themida behavioral2/memory/5004-159-0x0000000000280000-0x0000000000C52000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5004 48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5004 48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe 5004 48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe"C:\Users\Admin\AppData\Local\Temp\48f6242537331f5142237c388fc8fa1f52eecd568af2af01695342b1d17c4fd4.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5004