Analysis
-
max time kernel
91s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2023, 19:57
Behavioral task
behavioral1
Sample
Susano.exe
Resource
win7-20230220-en
7 signatures
150 seconds
General
-
Target
Susano.exe
-
Size
4.7MB
-
MD5
e510bcfba680e5c1eba10f46f53057b8
-
SHA1
32589e836e9748db5a8d1c919be3c603fe5caad0
-
SHA256
e315b87816d0f844ac2ad05136cf9755d4ba7a53b1080a84525418dc582b2ef9
-
SHA512
fca9e45010a5fe61430519a77119a342c0f87b99bd7f110a63f0b3b2c1c608f1df97c1938cde61f33d429ca8b8f601c8f7eb29e6ce5f2c264b2f5ef50261ac9b
-
SSDEEP
98304:TRBJj2opJUx8yCE0CgVPaCTGyH9/e7R0gVf3stq2kJcJozcJPm11ac:TRr2KzE0Cg5CEgVR2kcecJPk1
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Susano.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Susano.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Susano.exe -
resource yara_rule behavioral2/memory/4148-133-0x00007FF68EFB0000-0x00007FF68FC5F000-memory.dmp themida behavioral2/memory/4148-134-0x00007FF68EFB0000-0x00007FF68FC5F000-memory.dmp themida behavioral2/memory/4148-135-0x00007FF68EFB0000-0x00007FF68FC5F000-memory.dmp themida behavioral2/memory/4148-136-0x00007FF68EFB0000-0x00007FF68FC5F000-memory.dmp themida behavioral2/memory/4148-137-0x00007FF68EFB0000-0x00007FF68FC5F000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Susano.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4148 Susano.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4148 Susano.exe 4148 Susano.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 4148 Susano.exe Token: SeDebugPrivilege 4148 Susano.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Susano.exe"C:\Users\Admin\AppData\Local\Temp\Susano.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3248