Analysis
-
max time kernel
60s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 20:30
General
-
Target
BitCheats.exe
-
Size
9.5MB
-
MD5
f9350631e747006dd165af9d0173f15d
-
SHA1
2ea2280fc4518185b0658555aa728ccf5a34f664
-
SHA256
ee3c9fdf9ac72921233d688db367410456b4a569f764e898ee9f883b50669dd6
-
SHA512
3521999a4f8fa787947bba0ed15812a41090fd76fdd06350fbe2f79cf0be8f6fc9abe29c166874ed67fd245bfb966579b4cb89a65f21a3d001bbc2182821e107
-
SSDEEP
196608:0d/n2e9fPh6lB6tKhWvBXFu8AkVURItvIpkIT1D746ERa:A/2uXhKvWvZLPCI5kkwB7paa
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
BitCheats.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BitCheats.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
BitCheats.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BitCheats.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BitCheats.exe -
Executes dropped EXE 1 IoCs
Processes:
pid process 804 -
Loads dropped DLL 3 IoCs
Processes:
BitCheats.exepid process 1504 BitCheats.exe 1504 BitCheats.exe 1504 BitCheats.exe -
Processes:
resource yara_rule behavioral1/memory/1504-133-0x00007FF6D8400000-0x00007FF6D9D2B000-memory.dmp themida behavioral1/memory/1504-138-0x00007FF6D8400000-0x00007FF6D9D2B000-memory.dmp themida behavioral1/memory/1504-139-0x00007FF6D8400000-0x00007FF6D9D2B000-memory.dmp themida behavioral1/memory/1504-140-0x00007FF6D8400000-0x00007FF6D9D2B000-memory.dmp themida behavioral1/memory/1504-145-0x00007FF6D8400000-0x00007FF6D9D2B000-memory.dmp themida behavioral1/memory/1504-146-0x00007FF6D8400000-0x00007FF6D9D2B000-memory.dmp themida behavioral1/memory/1504-147-0x00007FF6D8400000-0x00007FF6D9D2B000-memory.dmp themida behavioral1/memory/1504-159-0x00007FF6D8400000-0x00007FF6D9D2B000-memory.dmp themida behavioral1/memory/1504-161-0x00007FF6D8400000-0x00007FF6D9D2B000-memory.dmp themida -
Processes:
BitCheats.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitCheats.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
BitCheats.exepid process 1504 BitCheats.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3012 1504 WerFault.exe BitCheats.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
BitCheats.exepid process 1504 BitCheats.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BitCheats.exe"C:\Users\Admin\AppData\Local\Temp\BitCheats.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1504 -s 5122⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 436 -p 1504 -ip 15041⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\bwWPHrTsJZ.dllFilesize
49KB
MD5ac3da38df3e1fbf4977da44c2f8aa9ae
SHA13c1d0cceede7849123ddbc742be6e0be1b48970e
SHA256dd6e17839dd51b459c05318304acb52f8751db8d5a67679a3c8b5139f8db98e5
SHA512dda5a05a0497ea12e0899716456d97b224f1c6dfe010ee7873bcdf764f49f6783b6189391ed3defbcc3da47e4e85e830981b15d2f0b3c51ae5bef15b3604e175
-
C:\Users\Admin\AppData\Local\Temp\bwWPHrTsJZ.dllFilesize
49KB
MD5ac3da38df3e1fbf4977da44c2f8aa9ae
SHA13c1d0cceede7849123ddbc742be6e0be1b48970e
SHA256dd6e17839dd51b459c05318304acb52f8751db8d5a67679a3c8b5139f8db98e5
SHA512dda5a05a0497ea12e0899716456d97b224f1c6dfe010ee7873bcdf764f49f6783b6189391ed3defbcc3da47e4e85e830981b15d2f0b3c51ae5bef15b3604e175
-
C:\Users\Admin\AppData\Local\Temp\d3d11.dllFilesize
2.4MB
MD5b284ae0d37cc7d47fc149bf93ef6a5bf
SHA13952b84377b0a1d267daae711ee47581749cb2a3
SHA2560d1fe975cc83acc64a5c2341fbed3700a10509fa3df64535bc50adddd95b7f8b
SHA512b3982d34808264907520602a5a7798c20b035e78152731856b2c3e0b83086a9b744377e2a2014a3ed91fcb9478468986360fcd62df98a544c9f8a856829ffc33
-
C:\Users\Admin\AppData\Local\Temp\d3dcompiler_47.dllFilesize
4.1MB
MD5222d020bd33c90170a8296adc1b7036a
SHA1612e6f443d927330b9b8ac13cc4a2a6b959cee48
SHA2564432bbd1a390874f3f0a503d45cc48d346abc3a8c0213c289f4b615bf0ee84f3
SHA512ad8c7ce7f6f353da5e2cf816e1a69f1ec14011612e8041e4f9bb6ebed3e0fa4e4ebc069155a0c66e23811467012c201893b9b3b7a947d089ce2c749d5e8910c6
-
memory/1504-147-0x00007FF6D8400000-0x00007FF6D9D2B000-memory.dmpFilesize
25.2MB
-
memory/1504-140-0x00007FF6D8400000-0x00007FF6D9D2B000-memory.dmpFilesize
25.2MB
-
memory/1504-145-0x00007FF6D8400000-0x00007FF6D9D2B000-memory.dmpFilesize
25.2MB
-
memory/1504-146-0x00007FF6D8400000-0x00007FF6D9D2B000-memory.dmpFilesize
25.2MB
-
memory/1504-133-0x00007FF6D8400000-0x00007FF6D9D2B000-memory.dmpFilesize
25.2MB
-
memory/1504-153-0x00007FFA5B9B0000-0x00007FFA5B9C0000-memory.dmpFilesize
64KB
-
memory/1504-152-0x00007FFA5B9B0000-0x00007FFA5B9C0000-memory.dmpFilesize
64KB
-
memory/1504-139-0x00007FF6D8400000-0x00007FF6D9D2B000-memory.dmpFilesize
25.2MB
-
memory/1504-157-0x000001E872300000-0x000001E872301000-memory.dmpFilesize
4KB
-
memory/1504-138-0x00007FF6D8400000-0x00007FF6D9D2B000-memory.dmpFilesize
25.2MB
-
memory/1504-159-0x00007FF6D8400000-0x00007FF6D9D2B000-memory.dmpFilesize
25.2MB
-
memory/1504-161-0x00007FF6D8400000-0x00007FF6D9D2B000-memory.dmpFilesize
25.2MB