General

  • Target

    OREWFLAJVDPPEA.exe

  • Size

    22.5MB

  • Sample

    230401-ameersef85

  • MD5

    ee054dd3be1b4d7b68ff8a7131a9abc8

  • SHA1

    bd064b20ff7d802220833fcbf922bb86fc796f85

  • SHA256

    1afb00d93e1299f8a51a42d25841ef1fb7ce686c30cbd80e5efe327b4dce4e43

  • SHA512

    033e48b71db8f5992a9237be68b59a95742342fbc4d2975761c6948233cf5a77aa41da91894bfdbc7e73cba39c55856fe33ad19a58ddacf4b56cc03e5d79b876

  • SSDEEP

    393216:SOaORp/IA1I+zjCXXonzxiBjYmW6EMdeC0WjKrcrWGq58a8eJpadc6mxvJLnRr2:PHVIAXzjqglOYmBdc4rWGt7mxvJLnRS

Malware Config

Targets

    • Target

      OREWFLAJVDPPEA.exe

    • Size

      22.5MB

    • MD5

      ee054dd3be1b4d7b68ff8a7131a9abc8

    • SHA1

      bd064b20ff7d802220833fcbf922bb86fc796f85

    • SHA256

      1afb00d93e1299f8a51a42d25841ef1fb7ce686c30cbd80e5efe327b4dce4e43

    • SHA512

      033e48b71db8f5992a9237be68b59a95742342fbc4d2975761c6948233cf5a77aa41da91894bfdbc7e73cba39c55856fe33ad19a58ddacf4b56cc03e5d79b876

    • SSDEEP

      393216:SOaORp/IA1I+zjCXXonzxiBjYmW6EMdeC0WjKrcrWGq58a8eJpadc6mxvJLnRr2:PHVIAXzjqglOYmBdc4rWGt7mxvJLnRS

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks