Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2023 07:10
General
-
Target
dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exe
-
Size
6.9MB
-
MD5
9468ee14458c641df58cc7cee92e7719
-
SHA1
d2586659aebfbe2d873bba54ba29bd7920c72994
-
SHA256
dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5
-
SHA512
bab5a67ffe9b133f0f84c1082193ada89873463d6aac5f001d303edfb0c58a4cf9207c24e8594ac18a843003d49164ded57413b2acc5640192f651650f7d3ccf
-
SSDEEP
196608:WDlnTW4qWp/q4O6bTLICybW/RiuDIuUf7EhLTrF6f6:2dTFqWpd7LXJzDHU/6
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exe -
Loads dropped DLL 2 IoCs
Processes:
dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exepid process 1852 dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exe 1852 dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exe -
Obfuscated with Agile.Net obfuscator 32 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1852-155-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-157-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-160-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-162-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-164-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-166-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-168-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-170-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-172-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-174-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-176-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-178-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-180-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-182-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-184-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-186-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-188-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-190-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-192-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-194-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-196-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-199-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-201-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-203-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-205-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-207-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-209-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-211-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-213-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-215-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-217-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net behavioral1/memory/1852-220-0x000000000A310000-0x000000000A4E8000-memory.dmp agile_net -
Processes:
resource yara_rule behavioral1/memory/1852-137-0x0000000000C70000-0x00000000018A2000-memory.dmp themida behavioral1/memory/1852-138-0x0000000000C70000-0x00000000018A2000-memory.dmp themida behavioral1/memory/1852-11098-0x0000000000C70000-0x00000000018A2000-memory.dmp themida -
Processes:
dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exepid process 1852 dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exepid process 1852 dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exe 1852 dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exe 1852 dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exedescription pid process Token: SeDebugPrivilege 1852 dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exe"C:\Users\Admin\AppData\Local\Temp\dedeceb8284ebc184f1a02840c36140986defef77be965f8e5fd78b8e47a25a5.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ScintillaNET\3.6.3\x86\SciLexer.dllFilesize
943KB
MD52ff7acfa80647ee46cc3c0e446327108
SHA1c994820d03af722c244b046d1ee0967f1b5bc478
SHA25608f0cbbc5162f236c37166772be2c9b8ffd465d32df17ea9d45626c4ed2c911d
SHA51250a9e20c5851d3a50f69651bc770885672ff4f97de32dfda55bf7488abd39a11e990525ec9152d250072acaad0c12a484155c31083d751668eb01addea5570cd
-
C:\Users\Admin\AppData\Local\Temp\fe18e516-f12f-4073-bf13-52a839118bfb\GunaDotNetRT.dllFilesize
136KB
MD59af5eb006bb0bab7f226272d82c896c7
SHA1c2a5bb42a5f08f4dc821be374b700652262308f0
SHA25677dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db
SHA5127badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a
-
C:\Users\Admin\AppData\Local\Temp\fe18e516-f12f-4073-bf13-52a839118bfb\GunaDotNetRT.dllFilesize
136KB
MD59af5eb006bb0bab7f226272d82c896c7
SHA1c2a5bb42a5f08f4dc821be374b700652262308f0
SHA25677dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db
SHA5127badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a
-
memory/1852-133-0x0000000000C70000-0x00000000018A2000-memory.dmpFilesize
12.2MB
-
memory/1852-137-0x0000000000C70000-0x00000000018A2000-memory.dmpFilesize
12.2MB
-
memory/1852-138-0x0000000000C70000-0x00000000018A2000-memory.dmpFilesize
12.2MB
-
memory/1852-139-0x00000000063C0000-0x0000000006964000-memory.dmpFilesize
5.6MB
-
memory/1852-140-0x0000000005C90000-0x0000000005D22000-memory.dmpFilesize
584KB
-
memory/1852-141-0x0000000005D30000-0x0000000005D3A000-memory.dmpFilesize
40KB
-
memory/1852-143-0x0000000003A80000-0x0000000003A90000-memory.dmpFilesize
64KB
-
memory/1852-154-0x0000000073CC0000-0x0000000073D49000-memory.dmpFilesize
548KB
-
memory/1852-155-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-156-0x0000000003A80000-0x0000000003A90000-memory.dmpFilesize
64KB
-
memory/1852-158-0x0000000070640000-0x0000000070677000-memory.dmpFilesize
220KB
-
memory/1852-157-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-160-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-162-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-164-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-166-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-168-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-170-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-172-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-174-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-176-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-178-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-180-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-182-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-184-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-186-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-188-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-190-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-192-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-194-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-196-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-199-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-201-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-203-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-205-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-207-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-209-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-211-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-213-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-215-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-217-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-219-0x0000000000C70000-0x00000000018A2000-memory.dmpFilesize
12.2MB
-
memory/1852-220-0x000000000A310000-0x000000000A4E8000-memory.dmpFilesize
1.8MB
-
memory/1852-633-0x0000000003A80000-0x0000000003A90000-memory.dmpFilesize
64KB
-
memory/1852-728-0x0000000070640000-0x0000000070677000-memory.dmpFilesize
220KB
-
memory/1852-726-0x0000000003A80000-0x0000000003A90000-memory.dmpFilesize
64KB
-
memory/1852-11093-0x0000000001C90000-0x0000000001D2C000-memory.dmpFilesize
624KB
-
memory/1852-11098-0x0000000000C70000-0x00000000018A2000-memory.dmpFilesize
12.2MB
-
memory/1852-11099-0x0000000070640000-0x0000000070677000-memory.dmpFilesize
220KB