Analysis

  • max time kernel
    941s
  • max time network
    946s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2023 20:56

General

  • Target

    Setup.exe

  • Size

    376.3MB

  • MD5

    38eb2b2611ed105e0a1bb9e331abb038

  • SHA1

    fa05ff8ecca6a42e15e1218c423316a7cad3674a

  • SHA256

    08e4f43424b6845ea482ac01d1094d883a1d18b631669a4d9627c77dbf7acf76

  • SHA512

    e33128a3f516c6dc903850090b546f764182a46f38563faf57029e861ae165ce45ca713c99d26a16d6cc1e3ae0d6e7c3e2c990d3b7f2a393d12243b72aa7a3a8

  • SSDEEP

    49152:XToqRjktHN+cEUoqJCCudWoCoRXb2YP4Fu7iHeCNVrMqaXsd4AC:jTRAB7Ci5OXb2YP4Fu7+eCNVwqxd4AC

Malware Config

Signatures

  • BlueFox

    BlueFox is an infostealer written in C# and first seen in December 2021.

  • BlueFox Stealer payload 4 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 5 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:3752
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1576
    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2384

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Setup.exe.log

      Filesize

      426B

      MD5

      5a664d2a0541423c0ffa430f3d013c61

      SHA1

      dcfaa94b883875bdaa09fd401f4d794b4025503b

      SHA256

      177e204d0933dbcd56c7857018db8c8c6e49dd3e9b47f0d5e247b3a4b855a209

      SHA512

      f382b7de1b12f1ec2d6ed57550b04348d6b8f9844f63723946361a05be48d96c56d2d6a7f3758342cfbfe9f858cd042f00d7f2f5e1b1bbc59a90b250bd132cd9

    • memory/2384-144-0x0000000074210000-0x00000000747C1000-memory.dmp

      Filesize

      5.7MB

    • memory/2384-140-0x0000000000DF0000-0x00000000013D3000-memory.dmp

      Filesize

      5.9MB

    • memory/2384-141-0x0000000077370000-0x0000000077513000-memory.dmp

      Filesize

      1.6MB

    • memory/2384-149-0x0000000074210000-0x00000000747C1000-memory.dmp

      Filesize

      5.7MB

    • memory/2384-142-0x0000000074210000-0x00000000747C1000-memory.dmp

      Filesize

      5.7MB

    • memory/2384-148-0x0000000077370000-0x0000000077513000-memory.dmp

      Filesize

      1.6MB

    • memory/2384-139-0x0000000000DF0000-0x00000000013D3000-memory.dmp

      Filesize

      5.9MB

    • memory/2384-143-0x0000000077370000-0x0000000077513000-memory.dmp

      Filesize

      1.6MB

    • memory/3752-137-0x0000000077370000-0x0000000077513000-memory.dmp

      Filesize

      1.6MB

    • memory/3752-134-0x0000000077370000-0x0000000077513000-memory.dmp

      Filesize

      1.6MB

    • memory/3752-135-0x0000000074210000-0x00000000747C1000-memory.dmp

      Filesize

      5.7MB

    • memory/3752-132-0x0000000000DF0000-0x00000000013D3000-memory.dmp

      Filesize

      5.9MB

    • memory/3752-145-0x0000000077370000-0x0000000077513000-memory.dmp

      Filesize

      1.6MB

    • memory/3752-146-0x0000000074210000-0x00000000747C1000-memory.dmp

      Filesize

      5.7MB

    • memory/3752-133-0x0000000000DF0000-0x00000000013D3000-memory.dmp

      Filesize

      5.9MB

    • memory/3752-138-0x0000000074210000-0x00000000747C1000-memory.dmp

      Filesize

      5.7MB

    • memory/3752-136-0x0000000000DF0000-0x00000000013D3000-memory.dmp

      Filesize

      5.9MB