Analysis

  • max time kernel
    29s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    29-03-2023 00:14

General

  • Target

    2ud.exe

  • Size

    4.2MB

  • MD5

    f2d96a7c78bacbdeb6a64f4b61a9eb80

  • SHA1

    019d4951a57bc0bd6957c5aec24809b5449b8f45

  • SHA256

    7063be36bb3a4a97742cdf3ddb85a25285b50bfadae5111e5b48ddd18d583e78

  • SHA512

    0932e638fc72af2ecd948305bcf3f29d25677de84bc001b6a62d4339640f111dc988f9e41a7c819906d027e7c5549165b5b123b84945bfd67918e9bbaa7a1eed

  • SSDEEP

    98304:ZNVpIBX3kf5xfyCgwbdHiVoZXSBjyVEnk/YRow0EcgUn5OxEiXHAa:LV+Z0fLyxwbdVZujGEnUYT7cgK4WiXHv

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 8 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ud.exe
    "C:\Users\Admin\AppData\Local\Temp\2ud.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1960

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1960-54-0x000000013F3D0000-0x000000013FE57000-memory.dmp
    Filesize

    10.5MB

  • memory/1960-55-0x000000013F3D0000-0x000000013FE57000-memory.dmp
    Filesize

    10.5MB

  • memory/1960-57-0x000000013F3D0000-0x000000013FE57000-memory.dmp
    Filesize

    10.5MB

  • memory/1960-58-0x000000013F3D0000-0x000000013FE57000-memory.dmp
    Filesize

    10.5MB

  • memory/1960-59-0x000000013F3D0000-0x000000013FE57000-memory.dmp
    Filesize

    10.5MB

  • memory/1960-60-0x000000013F3D0000-0x000000013FE57000-memory.dmp
    Filesize

    10.5MB

  • memory/1960-61-0x000000013F3D0000-0x000000013FE57000-memory.dmp
    Filesize

    10.5MB

  • memory/1960-62-0x000000013F3D0000-0x000000013FE57000-memory.dmp
    Filesize

    10.5MB