Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23-03-2023 10:47
Behavioral task
behavioral1
Sample
FuckMeDaddy.exe
Resource
win7-20230220-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
FuckMeDaddy.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
13 signatures
150 seconds
General
-
Target
FuckMeDaddy.exe
-
Size
4.2MB
-
MD5
220ff1ba3a62c1196e59b73315ce2cce
-
SHA1
60a0e81e130f519f87fef859c0f69fec338e30d6
-
SHA256
7edb45e51d05406adac04d2b0f00426b5f072127629a463084e4c105291620d4
-
SHA512
1bafa76c9d4e5d744d47e5128b7ffa9dd4696481ee5a4dafa031e6654517617d4e61c9df987123005f78b0e4d314c060354dd00d2c526c8a69f068d4bbabea12
-
SSDEEP
98304:cVZAL6CpWiZVYvyLM2Fu13UtPTF2iGdrS+GSed:iZAWqZ7LM2FulUybhSZt
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
FuckMeDaddy.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FuckMeDaddy.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
FuckMeDaddy.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FuckMeDaddy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FuckMeDaddy.exe -
Processes:
resource yara_rule behavioral1/memory/1368-55-0x000000013F950000-0x00000001403D1000-memory.dmp themida behavioral1/memory/1368-56-0x000000013F950000-0x00000001403D1000-memory.dmp themida behavioral1/memory/1368-57-0x000000013F950000-0x00000001403D1000-memory.dmp themida behavioral1/memory/1368-59-0x000000013F950000-0x00000001403D1000-memory.dmp themida behavioral1/memory/1368-60-0x000000013F950000-0x00000001403D1000-memory.dmp themida behavioral1/memory/1368-61-0x000000013F950000-0x00000001403D1000-memory.dmp themida behavioral1/memory/1368-62-0x000000013F950000-0x00000001403D1000-memory.dmp themida -
Processes:
FuckMeDaddy.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FuckMeDaddy.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1368-55-0x000000013F950000-0x00000001403D1000-memory.dmpFilesize
10.5MB
-
memory/1368-56-0x000000013F950000-0x00000001403D1000-memory.dmpFilesize
10.5MB
-
memory/1368-57-0x000000013F950000-0x00000001403D1000-memory.dmpFilesize
10.5MB
-
memory/1368-58-0x00000000000F0000-0x00000000000F1000-memory.dmpFilesize
4KB
-
memory/1368-59-0x000000013F950000-0x00000001403D1000-memory.dmpFilesize
10.5MB
-
memory/1368-60-0x000000013F950000-0x00000001403D1000-memory.dmpFilesize
10.5MB
-
memory/1368-61-0x000000013F950000-0x00000001403D1000-memory.dmpFilesize
10.5MB
-
memory/1368-62-0x000000013F950000-0x00000001403D1000-memory.dmpFilesize
10.5MB