Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-03-2023 18:34

General

  • Target

    2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exe

  • Size

    7.0MB

  • MD5

    96d50809dd1b8abd6aed2a41f8e5e71f

  • SHA1

    24de43aa8e69ce52bef3c397b2b7b345da54577b

  • SHA256

    2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f

  • SHA512

    0f6ba2334c811ced8662faac734b4783f018ade96c1fa65311b35247c371a6a917b38db1b4038c946b3374dfee0f819057d50b7d9eb8583d0e3a6bbd67565e67

  • SSDEEP

    196608:uLvYTFyzb9W4lg9VmXQxjDyFnPFrGPW8xqYU:uLvYAb8Ws6Q4tSGYU

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 2 IoCs
  • Obfuscated with Agile.Net obfuscator 32 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exe
    "C:\Users\Admin\AppData\Local\Temp\2730694acc68e8ef7155c311baa8972109ed51fbb056b5c6bb36c6428f5e864f.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:1456

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ScintillaNET\3.6.3\x86\SciLexer.dll
    Filesize

    943KB

    MD5

    2ff7acfa80647ee46cc3c0e446327108

    SHA1

    c994820d03af722c244b046d1ee0967f1b5bc478

    SHA256

    08f0cbbc5162f236c37166772be2c9b8ffd465d32df17ea9d45626c4ed2c911d

    SHA512

    50a9e20c5851d3a50f69651bc770885672ff4f97de32dfda55bf7488abd39a11e990525ec9152d250072acaad0c12a484155c31083d751668eb01addea5570cd

  • C:\Users\Admin\AppData\Local\Temp\fe18e516-f12f-4073-bf13-52a839118bfb\GunaDotNetRT.dll
    Filesize

    136KB

    MD5

    9af5eb006bb0bab7f226272d82c896c7

    SHA1

    c2a5bb42a5f08f4dc821be374b700652262308f0

    SHA256

    77dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db

    SHA512

    7badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a

  • C:\Users\Admin\AppData\Local\Temp\fe18e516-f12f-4073-bf13-52a839118bfb\GunaDotNetRT.dll
    Filesize

    136KB

    MD5

    9af5eb006bb0bab7f226272d82c896c7

    SHA1

    c2a5bb42a5f08f4dc821be374b700652262308f0

    SHA256

    77dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db

    SHA512

    7badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a

  • memory/1456-178-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-296-0x0000000005A50000-0x0000000005A60000-memory.dmp
    Filesize

    64KB

  • memory/1456-141-0x0000000005A50000-0x0000000005A60000-memory.dmp
    Filesize

    64KB

  • memory/1456-180-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-139-0x0000000006090000-0x0000000006634000-memory.dmp
    Filesize

    5.6MB

  • memory/1456-148-0x0000000005A50000-0x0000000005A60000-memory.dmp
    Filesize

    64KB

  • memory/1456-138-0x0000000000050000-0x0000000000CDE000-memory.dmp
    Filesize

    12.6MB

  • memory/1456-137-0x0000000000050000-0x0000000000CDE000-memory.dmp
    Filesize

    12.6MB

  • memory/1456-156-0x0000000072F50000-0x0000000072FD9000-memory.dmp
    Filesize

    548KB

  • memory/1456-157-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-158-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-160-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-163-0x000000006F8D0000-0x000000006F907000-memory.dmp
    Filesize

    220KB

  • memory/1456-162-0x0000000000050000-0x0000000000CDE000-memory.dmp
    Filesize

    12.6MB

  • memory/1456-164-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-166-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-168-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-184-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-172-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-174-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-176-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-133-0x0000000000050000-0x0000000000CDE000-memory.dmp
    Filesize

    12.6MB

  • memory/1456-142-0x0000000005A20000-0x0000000005A2A000-memory.dmp
    Filesize

    40KB

  • memory/1456-140-0x0000000005AE0000-0x0000000005B72000-memory.dmp
    Filesize

    584KB

  • memory/1456-170-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-186-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-188-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-190-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-192-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-194-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-196-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-198-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-200-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-202-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-204-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-206-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-208-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-210-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-212-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-214-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-216-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-218-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-220-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-182-0x0000000009F60000-0x000000000A138000-memory.dmp
    Filesize

    1.8MB

  • memory/1456-578-0x0000000005A50000-0x0000000005A60000-memory.dmp
    Filesize

    64KB