Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21-03-2023 18:39
Behavioral task
behavioral1
Sample
Notepad++.exe
Resource
win7-20230220-en
General
-
Target
Notepad++.exe
-
Size
9.5MB
-
MD5
53e4fa88bd8c51ba2d913380e3de6a2c
-
SHA1
9b4b91444e9ead8c667e87c36f08a7d2ebf3309b
-
SHA256
e8ae1f376e40875ff96c2b322faecee3b7f013b36662d9e45eed733f870994d0
-
SHA512
b48fab3b7aba5aa22b4d0d536cb7919d6a515c4450d2416ee029ad1fcda6933eb72a5658d9e1e1638bb377e84e1a397e922fbfe34e18522b1d3855208fbea97c
-
SSDEEP
196608:o1wjFLQPnIGNOfhw3tMGo6ysjLf0qCgFMh9uF9CeQ0mHEDzg/aymNd7t7:ljFUmW3tMTXGz7A5vHEDzMaB
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Notepad++.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Notepad++.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
Notepad++.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions Notepad++.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
Notepad++.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools Notepad++.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Notepad++.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Notepad++.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Notepad++.exe -
Processes:
resource yara_rule behavioral1/memory/1572-59-0x0000000000400000-0x0000000001A96000-memory.dmp themida behavioral1/memory/1572-62-0x0000000000400000-0x0000000001A96000-memory.dmp themida behavioral1/memory/1572-63-0x0000000000400000-0x0000000001A96000-memory.dmp themida -
Processes:
Notepad++.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Notepad++.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
Notepad++.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Notepad++.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Notepad++.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Notepad++.exepid process 1572 Notepad++.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Notepad++.exepid process 1572 Notepad++.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Notepad++.exedescription pid process Token: SeDebugPrivilege 1572 Notepad++.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Notepad++.exepid process 1572 Notepad++.exe 1572 Notepad++.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Notepad++.exe"C:\Users\Admin\AppData\Local\Temp\Notepad++.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1572-59-0x0000000000400000-0x0000000001A96000-memory.dmpFilesize
22.6MB
-
memory/1572-62-0x0000000000400000-0x0000000001A96000-memory.dmpFilesize
22.6MB
-
memory/1572-63-0x0000000000400000-0x0000000001A96000-memory.dmpFilesize
22.6MB
-
memory/1572-64-0x0000000005F70000-0x0000000005FB0000-memory.dmpFilesize
256KB
-
memory/1572-65-0x0000000007000000-0x0000000007406000-memory.dmpFilesize
4.0MB
-
memory/1572-66-0x00000000069B0000-0x00000000069E4000-memory.dmpFilesize
208KB
-
memory/1572-83-0x0000000005F70000-0x0000000005FB0000-memory.dmpFilesize
256KB
-
memory/1572-93-0x0000000005F70000-0x0000000005FB0000-memory.dmpFilesize
256KB
-
memory/1572-94-0x0000000000400000-0x0000000001A96000-memory.dmpFilesize
22.6MB
-
memory/1572-96-0x0000000005F70000-0x0000000005FB0000-memory.dmpFilesize
256KB
-
memory/1572-97-0x0000000005F70000-0x0000000005FB0000-memory.dmpFilesize
256KB
-
memory/1572-98-0x0000000005F70000-0x0000000005FB0000-memory.dmpFilesize
256KB
-
memory/1572-99-0x0000000005F70000-0x0000000005FB0000-memory.dmpFilesize
256KB