Analysis

  • max time kernel
    111s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    27-03-2023 05:35

General

  • Target

    SkyFlick2.1_WIN11/ResetHWID.exe

  • Size

    2.6MB

  • MD5

    d39c72eec8cde69944feda7cf386fd14

  • SHA1

    694538c10ca8ba6a95791b528b857db118f7785b

  • SHA256

    dc1f8e5c613b61e44cf394bbd36938ae90d432afcc6fbc90cbc07913419eca50

  • SHA512

    5fb46167f6fcb27212f3516de1ee4fbb88ae1425da7ad82cd44f4db82409eecbc5115088a8d7492681ee35a7c5297947f9cb1de8a899ad81bee496384bb5c221

  • SSDEEP

    49152:YJZ4qPVzHxJQ3zNJKaxPxFN1myo4UzfV/WX5RE/s/Td:kSqYJhx5FTmpB/WX5S/wd

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 8 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SkyFlick2.1_WIN11\ResetHWID.exe
    "C:\Users\Admin\AppData\Local\Temp\SkyFlick2.1_WIN11\ResetHWID.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:4824

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4824-133-0x00007FF7CB4C0000-0x00007FF7CBBB4000-memory.dmp
    Filesize

    7.0MB

  • memory/4824-134-0x00007FF7CB4C0000-0x00007FF7CBBB4000-memory.dmp
    Filesize

    7.0MB

  • memory/4824-135-0x00007FF7CB4C0000-0x00007FF7CBBB4000-memory.dmp
    Filesize

    7.0MB

  • memory/4824-136-0x00007FF7CB4C0000-0x00007FF7CBBB4000-memory.dmp
    Filesize

    7.0MB

  • memory/4824-137-0x00007FF7CB4C0000-0x00007FF7CBBB4000-memory.dmp
    Filesize

    7.0MB

  • memory/4824-138-0x00007FF7CB4C0000-0x00007FF7CBBB4000-memory.dmp
    Filesize

    7.0MB

  • memory/4824-140-0x00007FF7CB4C0000-0x00007FF7CBBB4000-memory.dmp
    Filesize

    7.0MB

  • memory/4824-144-0x00007FF7CB4C0000-0x00007FF7CBBB4000-memory.dmp
    Filesize

    7.0MB