Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26-03-2023 11:20
Behavioral task
behavioral1
Sample
AridekVM.exe
Resource
win7-20230220-en
windows7-x64
5 signatures
150 seconds
General
-
Target
AridekVM.exe
-
Size
12.9MB
-
MD5
7550996532016fa5bb2e7fcee4fbf1a4
-
SHA1
e0f0d2b17c03477196209ee9635f2a11283027d8
-
SHA256
c0afd7d86cb0586db959d19db36345676437acb53140ea9d91e6201041cadae7
-
SHA512
935714dc724e7c3e0f02fff28e0cf8c4eec81a3ea2c3c79669e99837fc77ac15e62456cda11771943c578075a6c74e6d01512c7e90048d527c96f60df18ef131
-
SSDEEP
196608:dEGgxWcn/V+7huajaJ+RWgKf4it0d3sbPKjGyhZvEwrPjVlQozzB4dDTe:dEjxWKNihNaJEW4Wis+DMwnQxi
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
AridekVM.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AridekVM.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
AridekVM.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AridekVM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AridekVM.exe -
Processes:
resource yara_rule behavioral1/memory/1588-54-0x000000013FB20000-0x0000000141521000-memory.dmp themida behavioral1/memory/1588-55-0x000000013FB20000-0x0000000141521000-memory.dmp themida behavioral1/memory/1588-56-0x000000013FB20000-0x0000000141521000-memory.dmp themida behavioral1/memory/1588-57-0x000000013FB20000-0x0000000141521000-memory.dmp themida behavioral1/memory/1588-58-0x000000013FB20000-0x0000000141521000-memory.dmp themida behavioral1/memory/1588-59-0x000000013FB20000-0x0000000141521000-memory.dmp themida behavioral1/memory/1588-60-0x000000013FB20000-0x0000000141521000-memory.dmp themida -
Processes:
AridekVM.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AridekVM.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
AridekVM.exepid process 1588 AridekVM.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1588-54-0x000000013FB20000-0x0000000141521000-memory.dmpFilesize
26.0MB
-
memory/1588-55-0x000000013FB20000-0x0000000141521000-memory.dmpFilesize
26.0MB
-
memory/1588-56-0x000000013FB20000-0x0000000141521000-memory.dmpFilesize
26.0MB
-
memory/1588-57-0x000000013FB20000-0x0000000141521000-memory.dmpFilesize
26.0MB
-
memory/1588-58-0x000000013FB20000-0x0000000141521000-memory.dmpFilesize
26.0MB
-
memory/1588-59-0x000000013FB20000-0x0000000141521000-memory.dmpFilesize
26.0MB
-
memory/1588-60-0x000000013FB20000-0x0000000141521000-memory.dmpFilesize
26.0MB