Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2023 18:34
General
-
Target
2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exe
-
Size
7.0MB
-
MD5
96d50809dd1b8abd6aed2a41f8e5e71f
-
SHA1
24de43aa8e69ce52bef3c397b2b7b345da54577b
-
SHA256
2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f
-
SHA512
0f6ba2334c811ced8662faac734b4783f018ade96c1fa65311b35247c371a6a917b38db1b4038c946b3374dfee0f819057d50b7d9eb8583d0e3a6bbd67565e67
-
SSDEEP
196608:uLvYTFyzb9W4lg9VmXQxjDyFnPFrGPW8xqYU:uLvYAb8Ws6Q4tSGYU
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exe -
Loads dropped DLL 2 IoCs
Processes:
2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exepid process 1456 2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exe 1456 2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exe -
Obfuscated with Agile.Net obfuscator 32 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1456-157-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-158-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-160-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-164-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-166-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-168-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-170-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-172-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-174-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-176-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-178-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-180-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-182-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-184-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-186-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-188-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-190-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-192-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-194-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-196-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-198-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-200-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-202-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-204-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-206-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-208-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-210-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-212-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-214-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-216-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-218-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net behavioral1/memory/1456-220-0x0000000009F60000-0x000000000A138000-memory.dmp agile_net -
Processes:
resource yara_rule behavioral1/memory/1456-137-0x0000000000050000-0x0000000000CDE000-memory.dmp themida behavioral1/memory/1456-138-0x0000000000050000-0x0000000000CDE000-memory.dmp themida -
Processes:
2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exepid process 1456 2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exepid process 1456 2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exe 1456 2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exe"C:\Users\Admin\AppData\Local\Temp\2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ScintillaNET\3.6.3\x86\SciLexer.dllFilesize
943KB
MD52ff7acfa80647ee46cc3c0e446327108
SHA1c994820d03af722c244b046d1ee0967f1b5bc478
SHA25608f0cbbc5162f236c37166772be2c9b8ffd465d32df17ea9d45626c4ed2c911d
SHA51250a9e20c5851d3a50f69651bc770885672ff4f97de32dfda55bf7488abd39a11e990525ec9152d250072acaad0c12a484155c31083d751668eb01addea5570cd
-
C:\Users\Admin\AppData\Local\Temp\fe18e516-f12f-4073-bf13-52a839118bfb\GunaDotNetRT.dllFilesize
136KB
MD59af5eb006bb0bab7f226272d82c896c7
SHA1c2a5bb42a5f08f4dc821be374b700652262308f0
SHA25677dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db
SHA5127badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a
-
C:\Users\Admin\AppData\Local\Temp\fe18e516-f12f-4073-bf13-52a839118bfb\GunaDotNetRT.dllFilesize
136KB
MD59af5eb006bb0bab7f226272d82c896c7
SHA1c2a5bb42a5f08f4dc821be374b700652262308f0
SHA25677dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db
SHA5127badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a
-
memory/1456-178-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-296-0x0000000005A50000-0x0000000005A60000-memory.dmpFilesize
64KB
-
memory/1456-141-0x0000000005A50000-0x0000000005A60000-memory.dmpFilesize
64KB
-
memory/1456-180-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-139-0x0000000006090000-0x0000000006634000-memory.dmpFilesize
5.6MB
-
memory/1456-148-0x0000000005A50000-0x0000000005A60000-memory.dmpFilesize
64KB
-
memory/1456-138-0x0000000000050000-0x0000000000CDE000-memory.dmpFilesize
12.6MB
-
memory/1456-137-0x0000000000050000-0x0000000000CDE000-memory.dmpFilesize
12.6MB
-
memory/1456-156-0x0000000072F50000-0x0000000072FD9000-memory.dmpFilesize
548KB
-
memory/1456-157-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-158-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-160-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-163-0x000000006F8D0000-0x000000006F907000-memory.dmpFilesize
220KB
-
memory/1456-162-0x0000000000050000-0x0000000000CDE000-memory.dmpFilesize
12.6MB
-
memory/1456-164-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-166-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-168-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-184-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-172-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-174-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-176-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-133-0x0000000000050000-0x0000000000CDE000-memory.dmpFilesize
12.6MB
-
memory/1456-142-0x0000000005A20000-0x0000000005A2A000-memory.dmpFilesize
40KB
-
memory/1456-140-0x0000000005AE0000-0x0000000005B72000-memory.dmpFilesize
584KB
-
memory/1456-170-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-186-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-188-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-190-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-192-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-194-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-196-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-198-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-200-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-202-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-204-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-206-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-208-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-210-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-212-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-214-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-216-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-218-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-220-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-182-0x0000000009F60000-0x000000000A138000-memory.dmpFilesize
1.8MB
-
memory/1456-578-0x0000000005A50000-0x0000000005A60000-memory.dmpFilesize
64KB