Analysis

  • max time kernel
    140s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    20-03-2023 20:37

General

  • Target

    Android.Physical.NET.exe

  • Size

    4.8MB

  • MD5

    dae3dd705e0a212341bc87e802e33d78

  • SHA1

    7a1f623c240e9e234f60fb398f5dc76ac7ff1abd

  • SHA256

    801ff04c7991bc26427b68f575aa7c6e6b77930b9cadeb3617fe6c6cedb1e67d

  • SHA512

    ac8849adfbf59551f9d6bad64d231d4aa1c8d21a46bd225ac5aab96f4e4d27b3634529223bcbc103cb905685471ca12e5c07f2105160f4978bfe92340ee79b4b

  • SSDEEP

    98304:AWwOKgOLG3MR6HlLIG73MhX8qXEdbyWKQil51NN0z:qOBPl8GK8q22WGNNs

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Android.Physical.NET.exe
    "C:\Users\Admin\AppData\Local\Temp\Android.Physical.NET.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1396 -s 548
      2⤵
      • Program crash
      PID:2012

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1396-54-0x0000000000F40000-0x0000000001B40000-memory.dmp
    Filesize

    12.0MB

  • memory/1396-55-0x0000000000F40000-0x0000000001B40000-memory.dmp
    Filesize

    12.0MB

  • memory/1396-56-0x00000000005F0000-0x00000000005F1000-memory.dmp
    Filesize

    4KB

  • memory/1396-57-0x000007FE80010000-0x000007FE80011000-memory.dmp
    Filesize

    4KB

  • memory/1396-59-0x0000000000F40000-0x0000000001B40000-memory.dmp
    Filesize

    12.0MB