Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-03-2023 04:18

General

  • Target

    frAQBc8W.exe

  • Size

    4.4MB

  • MD5

    c5e25683bad6530516b83b00c6332788

  • SHA1

    4cb7f56d9332b8d3dd2bbe65b231f27d52598620

  • SHA256

    f065d31c557335cad992a806aad8adb893ee2b35de8ab3b206290006991f354f

  • SHA512

    440c4191797704bae1609092631dd5dfdefd71c84281facd921cd6b19cbc1e52c781b2c0864d08871558e9788cdec0b38bcd1d701aa0432a9360e52eff775646

  • SSDEEP

    98304:aUTa4GtDOPFiDyqc1RxZ3mYmZix9nSz8cQGDtE6pQacW8KPOXxK:H2DOPFiDyqc1UiS8mLpaoOXxK

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 19 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\frAQBc8W.exe
    "C:\Users\Admin\AppData\Local\Temp\frAQBc8W.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Looks for VirtualBox Guest Additions in registry
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks for VirtualBox DLLs, possible anti-VM trick
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c color 2
      2⤵
        PID:548
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c color 5
        2⤵
          PID:1660
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c CLS
          2⤵
            PID:4812
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\frAQBc8W.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3148
            • C:\Windows\system32\certutil.exe
              certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\frAQBc8W.exe" MD5
              3⤵
                PID:416
              • C:\Windows\system32\find.exe
                find /i /v "md5"
                3⤵
                  PID:3900
                • C:\Windows\system32\find.exe
                  find /i /v "certutil"
                  3⤵
                    PID:4904
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c CLS
                  2⤵
                    PID:4460
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c color 5
                    2⤵
                      PID:4568

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Defense Evasion

                  Virtualization/Sandbox Evasion

                  2
                  T1497

                  Discovery

                  Query Registry

                  3
                  T1012

                  Virtualization/Sandbox Evasion

                  2
                  T1497

                  System Information Discovery

                  3
                  T1082

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • memory/4028-133-0x00007FF6C7F40000-0x00007FF6C8B05000-memory.dmp
                    Filesize

                    11.8MB

                  • memory/4028-134-0x00007FF6C7F40000-0x00007FF6C8B05000-memory.dmp
                    Filesize

                    11.8MB

                  • memory/4028-135-0x00007FF6C7F40000-0x00007FF6C8B05000-memory.dmp
                    Filesize

                    11.8MB

                  • memory/4028-136-0x00007FF6C7F40000-0x00007FF6C8B05000-memory.dmp
                    Filesize

                    11.8MB

                  • memory/4028-137-0x00007FF6C7F40000-0x00007FF6C8B05000-memory.dmp
                    Filesize

                    11.8MB

                  • memory/4028-171-0x00007FF6C7F40000-0x00007FF6C8B05000-memory.dmp
                    Filesize

                    11.8MB

                  • memory/4028-227-0x00007FF6C7F40000-0x00007FF6C8B05000-memory.dmp
                    Filesize

                    11.8MB

                  • memory/4028-279-0x00007FF6C7F40000-0x00007FF6C8B05000-memory.dmp
                    Filesize

                    11.8MB

                  • memory/4028-332-0x00007FF6C7F40000-0x00007FF6C8B05000-memory.dmp
                    Filesize

                    11.8MB

                  • memory/4028-383-0x00007FF6C7F40000-0x00007FF6C8B05000-memory.dmp
                    Filesize

                    11.8MB

                  • memory/4028-442-0x00007FF6C7F40000-0x00007FF6C8B05000-memory.dmp
                    Filesize

                    11.8MB

                  • memory/4028-496-0x00007FF6C7F40000-0x00007FF6C8B05000-memory.dmp
                    Filesize

                    11.8MB

                  • memory/4028-558-0x00007FF6C7F40000-0x00007FF6C8B05000-memory.dmp
                    Filesize

                    11.8MB

                  • memory/4028-616-0x00007FF6C7F40000-0x00007FF6C8B05000-memory.dmp
                    Filesize

                    11.8MB

                  • memory/4028-684-0x00007FF6C7F40000-0x00007FF6C8B05000-memory.dmp
                    Filesize

                    11.8MB

                  • memory/4028-750-0x00007FF6C7F40000-0x00007FF6C8B05000-memory.dmp
                    Filesize

                    11.8MB

                  • memory/4028-810-0x00007FF6C7F40000-0x00007FF6C8B05000-memory.dmp
                    Filesize

                    11.8MB

                  • memory/4028-876-0x00007FF6C7F40000-0x00007FF6C8B05000-memory.dmp
                    Filesize

                    11.8MB

                  • memory/4028-936-0x00007FF6C7F40000-0x00007FF6C8B05000-memory.dmp
                    Filesize

                    11.8MB