Analysis
-
max time kernel
11s -
max time network
10s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
26-03-2023 04:32
General
-
Target
SPOOFER_AC_BLOCKER.exe
-
Size
3.5MB
-
MD5
477c6e1f4f142e550469a352a9a8b8a7
-
SHA1
9d5fc700660494f133235266bec04060234df9e7
-
SHA256
286f4b475b248fcb08bcec57234303647da69515e8258cebda2ee7dbcd6f4541
-
SHA512
4d83c9f4dad54af11cedb5ea9dd9fa2544045637cd937ea0cfcd70113b26ec903c6f1a9cc340b7c7aa76a7d559213d1d776fcc2f0e8a30c3d9f6ce237615f3b3
-
SSDEEP
49152:qtkuOsOrajWHPKPmYfEKbFpXVT2Fy/VFUvSntXmrxplSNk6J/sfEAXoW96NdLA6n:JujOrRgmYfFuItFqamrANxsfnXoWod0G
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
SPOOFER_AC_BLOCKER.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SPOOFER_AC_BLOCKER.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
SPOOFER_AC_BLOCKER.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SPOOFER_AC_BLOCKER.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SPOOFER_AC_BLOCKER.exe -
Processes:
resource yara_rule behavioral1/memory/4140-116-0x00007FF6F13F0000-0x00007FF6F1D5E000-memory.dmp themida behavioral1/memory/4140-117-0x00007FF6F13F0000-0x00007FF6F1D5E000-memory.dmp themida behavioral1/memory/4140-118-0x00007FF6F13F0000-0x00007FF6F1D5E000-memory.dmp themida behavioral1/memory/4140-119-0x00007FF6F13F0000-0x00007FF6F1D5E000-memory.dmp themida behavioral1/memory/4140-120-0x00007FF6F13F0000-0x00007FF6F1D5E000-memory.dmp themida behavioral1/memory/4140-121-0x00007FF6F13F0000-0x00007FF6F1D5E000-memory.dmp themida behavioral1/memory/4140-122-0x00007FF6F13F0000-0x00007FF6F1D5E000-memory.dmp themida behavioral1/memory/4140-123-0x00007FF6F13F0000-0x00007FF6F1D5E000-memory.dmp themida -
Processes:
SPOOFER_AC_BLOCKER.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SPOOFER_AC_BLOCKER.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
SPOOFER_AC_BLOCKER.exepid process 4140 SPOOFER_AC_BLOCKER.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SPOOFER_AC_BLOCKER.exe"C:\Users\Admin\AppData\Local\Temp\SPOOFER_AC_BLOCKER.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4140-116-0x00007FF6F13F0000-0x00007FF6F1D5E000-memory.dmpFilesize
9.4MB
-
memory/4140-117-0x00007FF6F13F0000-0x00007FF6F1D5E000-memory.dmpFilesize
9.4MB
-
memory/4140-118-0x00007FF6F13F0000-0x00007FF6F1D5E000-memory.dmpFilesize
9.4MB
-
memory/4140-119-0x00007FF6F13F0000-0x00007FF6F1D5E000-memory.dmpFilesize
9.4MB
-
memory/4140-120-0x00007FF6F13F0000-0x00007FF6F1D5E000-memory.dmpFilesize
9.4MB
-
memory/4140-121-0x00007FF6F13F0000-0x00007FF6F1D5E000-memory.dmpFilesize
9.4MB
-
memory/4140-122-0x00007FF6F13F0000-0x00007FF6F1D5E000-memory.dmpFilesize
9.4MB
-
memory/4140-123-0x00007FF6F13F0000-0x00007FF6F1D5E000-memory.dmpFilesize
9.4MB