Analysis

  • max time kernel
    52s
  • max time network
    49s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-03-2023 20:50

General

  • Target

    Roles_External.exe

  • Size

    9.0MB

  • MD5

    002ad7c91deb54e30a919846fe124eaf

  • SHA1

    cb092513ae675fe243d92328310471f09b51267a

  • SHA256

    e9d01a1df753a60c21218dc713bf5b2fa95cd82ceb0f760afd1027249812aabe

  • SHA512

    2e873b8ec2d32ba60117c6423d7bfca9da830870e0238044a1d50fdb0784598ef20325ff62462c6f88078ddc385dfd854f36f8b47aae9610c83a6d5f92b97fd7

  • SSDEEP

    196608:p7tXDri3gUyVl21VNlNNjx4MLm6iE8y4HCh4Iv9o9qmDmHYmGN1:pJTrznCJjxpi6iE8y2Ch4MaPm4mO1

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Roles_External.exe
    "C:\Users\Admin\AppData\Local\Temp\Roles_External.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:868

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/868-133-0x0000000000230000-0x00000000010EC000-memory.dmp
    Filesize

    14.7MB

  • memory/868-136-0x0000000000230000-0x00000000010EC000-memory.dmp
    Filesize

    14.7MB

  • memory/868-137-0x0000000000230000-0x00000000010EC000-memory.dmp
    Filesize

    14.7MB

  • memory/868-138-0x0000000005D90000-0x0000000005E22000-memory.dmp
    Filesize

    584KB

  • memory/868-139-0x0000000005C30000-0x0000000005C42000-memory.dmp
    Filesize

    72KB

  • memory/868-140-0x00000000063E0000-0x0000000006984000-memory.dmp
    Filesize

    5.6MB

  • memory/868-141-0x0000000005D80000-0x0000000005D90000-memory.dmp
    Filesize

    64KB

  • memory/868-143-0x0000000000230000-0x00000000010EC000-memory.dmp
    Filesize

    14.7MB

  • memory/868-146-0x0000000000230000-0x00000000010EC000-memory.dmp
    Filesize

    14.7MB