Analysis

  • max time kernel
    61s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/04/2023, 05:47

General

  • Target

    f000a02a12b8c42631ebaeb5f3bea526.exe

  • Size

    1.4MB

  • MD5

    f000a02a12b8c42631ebaeb5f3bea526

  • SHA1

    d3bbde75e31c82a9d8d7e577cb543d0eef5e8205

  • SHA256

    c17002f0e688dd34ca4bde9cc512df3ee4d5b1a069b20f908ba653ff02853be4

  • SHA512

    b6015e885d06654cb9f68afedcf520f9c1541c81a5d91d0f520ee48962cd3f41967b9d8c541d390f5253de47ce6141f45f4938b93e5fa491ae169d6a16fdb3c3

  • SSDEEP

    24576:zaUzgWd8h3ox5Hz+PQdum5ka2UDbqPyfrzvsSLcf2JLQa0h0n+/MyM+5vMonk:WUlWhOHzb24xfrDsS8+BW0n+/Zd3k

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f000a02a12b8c42631ebaeb5f3bea526.exe
    "C:\Users\Admin\AppData\Local\Temp\f000a02a12b8c42631ebaeb5f3bea526.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4632

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4632-133-0x0000000000B70000-0x0000000001038000-memory.dmp

          Filesize

          4.8MB

        • memory/4632-137-0x0000000000B70000-0x0000000001038000-memory.dmp

          Filesize

          4.8MB

        • memory/4632-138-0x0000000008310000-0x0000000008928000-memory.dmp

          Filesize

          6.1MB

        • memory/4632-139-0x0000000007DA0000-0x0000000007DB2000-memory.dmp

          Filesize

          72KB

        • memory/4632-140-0x0000000007ED0000-0x0000000007FDA000-memory.dmp

          Filesize

          1.0MB

        • memory/4632-141-0x0000000007E00000-0x0000000007E3C000-memory.dmp

          Filesize

          240KB

        • memory/4632-142-0x0000000008110000-0x0000000008120000-memory.dmp

          Filesize

          64KB

        • memory/4632-143-0x0000000008190000-0x00000000081F6000-memory.dmp

          Filesize

          408KB

        • memory/4632-144-0x0000000008CD0000-0x0000000008D62000-memory.dmp

          Filesize

          584KB

        • memory/4632-145-0x0000000009320000-0x00000000098C4000-memory.dmp

          Filesize

          5.6MB

        • memory/4632-146-0x0000000008DF0000-0x0000000008E66000-memory.dmp

          Filesize

          472KB

        • memory/4632-147-0x0000000009040000-0x0000000009202000-memory.dmp

          Filesize

          1.8MB

        • memory/4632-148-0x0000000009E00000-0x000000000A32C000-memory.dmp

          Filesize

          5.2MB

        • memory/4632-149-0x0000000008F60000-0x0000000008F7E000-memory.dmp

          Filesize

          120KB

        • memory/4632-151-0x0000000000B70000-0x0000000001038000-memory.dmp

          Filesize

          4.8MB

        • memory/4632-154-0x0000000000B70000-0x0000000001038000-memory.dmp

          Filesize

          4.8MB