General
-
Target
Driver_Booster_19_02_23_to_msi.msi
-
Size
7.2MB
-
Sample
230220-ntzaeaac5y
-
MD5
5ad74e66323ae26320cd9c051f266a4f
-
SHA1
d7f999814e7c76466dba21619defc955d2660f20
-
SHA256
552c789cf68b88af18cf75ace35963445e3f7625cb07ae6b3933ceef26032f18
-
SHA512
019d370fe90818e1e5650496bbe3b187f0cb933e18b7644120ee25065974c108633bdab28db09bff879240d30de5a845572f4d1eb81ce92b469acc6ffa3f49a3
-
SSDEEP
196608:fYSxCsde/fxOql6socvDWnwlIzAY7kRSb6PdnjR:pxCz3xOHcRiERj
Static task
static1
Behavioral task
behavioral1
Sample
Driver_Booster_19_02_23_to_msi.msi
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
Driver_Booster_19_02_23_to_msi.msi
-
Size
7.2MB
-
MD5
5ad74e66323ae26320cd9c051f266a4f
-
SHA1
d7f999814e7c76466dba21619defc955d2660f20
-
SHA256
552c789cf68b88af18cf75ace35963445e3f7625cb07ae6b3933ceef26032f18
-
SHA512
019d370fe90818e1e5650496bbe3b187f0cb933e18b7644120ee25065974c108633bdab28db09bff879240d30de5a845572f4d1eb81ce92b469acc6ffa3f49a3
-
SSDEEP
196608:fYSxCsde/fxOql6socvDWnwlIzAY7kRSb6PdnjR:pxCz3xOHcRiERj
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Disables use of System Restore points
-
Possible privilege escalation attempt
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Modify Existing Service
1Scheduled Task
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
2File Deletion
2File and Directory Permissions Modification
1Hidden Files and Directories
2Modify Registry
2Virtualization/Sandbox Evasion
1