Analysis
-
max time kernel
269s -
max time network
251s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-es -
resource tags
arch:x64arch:x86image:win10v2004-20221111-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
19-01-2023 01:32
Static task
static1
Behavioral task
behavioral1
Sample
windows.exe
Resource
win7-20221111-es
Behavioral task
behavioral2
Sample
windows.exe
Resource
win10v2004-20221111-es
General
-
Target
windows.exe
-
Size
5.5MB
-
MD5
caa7805c7dc283359293bae074cb85ec
-
SHA1
f21c4880fbf40b8f03ed8954263106d814ac014d
-
SHA256
e24fbdd85caccbf63428e12d5e0afb7529c6c22469ed7414e80d5a6b9c02ac23
-
SHA512
206a54b956f7bed6f63a2f08b9ec6b9bec32fb628356e2b6189edea814e403bee385ce46420ca5a4d41e33d6306376c7c605f3645c5c3b85a0f0980d4ba5e8f1
-
SSDEEP
98304:E6mIaXo6zdDzxzWfqyD+OHSpUijWAsIC0A6NNU4chmX+dLFR:E6mY69zN8HSWijWAsIFA6NNvYmXuLL
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
windows.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ windows.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
windows.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion windows.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion windows.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
windows.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BheufaDg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\windows.exe" windows.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run windows.exe -
Processes:
windows.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA windows.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
windows.exepid process 4216 windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 15 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
windows.exepid process 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe 4216 windows.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
windows.exepid process 4216 windows.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
windows.exepid process 4216 windows.exe 4216 windows.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\windows.exe"C:\Users\Admin\AppData\Local\Temp\windows.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4216