Analysis
-
max time kernel
141s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-04-2023 01:37
Behavioral task
behavioral1
Sample
9656908ef92923f268a56bad8597742e.exe
Resource
win7-20230220-en
windows7-x64
9 signatures
150 seconds
General
-
Target
9656908ef92923f268a56bad8597742e.exe
-
Size
10.8MB
-
MD5
9656908ef92923f268a56bad8597742e
-
SHA1
55c98438a78365e27b67b5dd8f2b750c31cc4b8f
-
SHA256
58941ddaab5ecb07804f5ce07c6b8235e92328c2a8b8b5b2348ec9b0fbb68133
-
SHA512
446d969ece471271c5ec0ac962119398c9cf659967a2788a14433953c75e73e7c3f87c87a540c41e63c25957cfec0727582ec86972f0afec0e932867e2d07380
-
SSDEEP
196608:cYEHliAFTZxEIZOo7fgKotyHQvL7ZYrmh4nxoDjXHpl1RajX0kkD5ZLGmtr:cYEZDEeHbDoowvkmh4xKfajPgZamtr
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9656908ef92923f268a56bad8597742e.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9656908ef92923f268a56bad8597742e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9656908ef92923f268a56bad8597742e.exe -
resource yara_rule behavioral1/memory/1532-54-0x000000013F1A0000-0x0000000140677000-memory.dmp themida behavioral1/memory/1532-55-0x000000013F1A0000-0x0000000140677000-memory.dmp themida behavioral1/memory/1532-57-0x000000013F1A0000-0x0000000140677000-memory.dmp themida behavioral1/memory/1532-58-0x000000013F1A0000-0x0000000140677000-memory.dmp themida behavioral1/memory/1532-59-0x000000013F1A0000-0x0000000140677000-memory.dmp themida behavioral1/memory/1532-60-0x000000013F1A0000-0x0000000140677000-memory.dmp themida behavioral1/memory/1532-61-0x000000013F1A0000-0x0000000140677000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9656908ef92923f268a56bad8597742e.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1532 9656908ef92923f268a56bad8597742e.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1532 9656908ef92923f268a56bad8597742e.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 688 1532 WerFault.exe 26 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1532 9656908ef92923f268a56bad8597742e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1532 wrote to memory of 688 1532 9656908ef92923f268a56bad8597742e.exe 28 PID 1532 wrote to memory of 688 1532 9656908ef92923f268a56bad8597742e.exe 28 PID 1532 wrote to memory of 688 1532 9656908ef92923f268a56bad8597742e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9656908ef92923f268a56bad8597742e.exe"C:\Users\Admin\AppData\Local\Temp\9656908ef92923f268a56bad8597742e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1532 -s 2562⤵
- Program crash
PID:688
-