Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29-03-2023 00:14
Behavioral task
behavioral1
Sample
2ud.exe
Resource
win7-20230220-en
windows7-x64
5 signatures
150 seconds
General
-
Target
2ud.exe
-
Size
4.2MB
-
MD5
f2d96a7c78bacbdeb6a64f4b61a9eb80
-
SHA1
019d4951a57bc0bd6957c5aec24809b5449b8f45
-
SHA256
7063be36bb3a4a97742cdf3ddb85a25285b50bfadae5111e5b48ddd18d583e78
-
SHA512
0932e638fc72af2ecd948305bcf3f29d25677de84bc001b6a62d4339640f111dc988f9e41a7c819906d027e7c5549165b5b123b84945bfd67918e9bbaa7a1eed
-
SSDEEP
98304:ZNVpIBX3kf5xfyCgwbdHiVoZXSBjyVEnk/YRow0EcgUn5OxEiXHAa:LV+Z0fLyxwbdVZujGEnUYT7cgK4WiXHv
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
2ud.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2ud.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
2ud.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2ud.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2ud.exe -
Processes:
resource yara_rule behavioral1/memory/1960-54-0x000000013F3D0000-0x000000013FE57000-memory.dmp themida behavioral1/memory/1960-55-0x000000013F3D0000-0x000000013FE57000-memory.dmp themida behavioral1/memory/1960-57-0x000000013F3D0000-0x000000013FE57000-memory.dmp themida behavioral1/memory/1960-58-0x000000013F3D0000-0x000000013FE57000-memory.dmp themida behavioral1/memory/1960-59-0x000000013F3D0000-0x000000013FE57000-memory.dmp themida behavioral1/memory/1960-60-0x000000013F3D0000-0x000000013FE57000-memory.dmp themida behavioral1/memory/1960-61-0x000000013F3D0000-0x000000013FE57000-memory.dmp themida behavioral1/memory/1960-62-0x000000013F3D0000-0x000000013FE57000-memory.dmp themida -
Processes:
2ud.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2ud.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
2ud.exepid process 1960 2ud.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1960-54-0x000000013F3D0000-0x000000013FE57000-memory.dmpFilesize
10.5MB
-
memory/1960-55-0x000000013F3D0000-0x000000013FE57000-memory.dmpFilesize
10.5MB
-
memory/1960-57-0x000000013F3D0000-0x000000013FE57000-memory.dmpFilesize
10.5MB
-
memory/1960-58-0x000000013F3D0000-0x000000013FE57000-memory.dmpFilesize
10.5MB
-
memory/1960-59-0x000000013F3D0000-0x000000013FE57000-memory.dmpFilesize
10.5MB
-
memory/1960-60-0x000000013F3D0000-0x000000013FE57000-memory.dmpFilesize
10.5MB
-
memory/1960-61-0x000000013F3D0000-0x000000013FE57000-memory.dmpFilesize
10.5MB
-
memory/1960-62-0x000000013F3D0000-0x000000013FE57000-memory.dmpFilesize
10.5MB