Analysis

  • max time kernel
    151s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-06-2023 15:41

General

  • Target

    Appfuscated - Cracked by Voxguard/AppFuscator.exe

  • Size

    5.6MB

  • MD5

    d19985c8b4de4a0cef2f5a4533140ca4

  • SHA1

    4fb1de3c3aebc888aec868a7d921ad6653e6aba4

  • SHA256

    1d0638e1f906f41b6dcb34a685223eb6b1b19874661a2131dcbe9c76e1ec1791

  • SHA512

    2eaf25002f57ffc2ece5c68bdf17182b393dceee0b836cb6d9d4c2ab7604b9b2e2dc47da1e9c6499fc341a23130c14dfbadd51530a11ae1e73c37ca1c4d3ba4d

  • SSDEEP

    98304:EIvuNN/N91h2eDZQjL7sU8I5DKBWoClkRGJewd8Y3evBQ9LtYVrEx3/o6ETgKbWt:ET9GeDVI5DKBWZlkgJedYs6LtYdEhqTp

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Themida packer 8 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Appfuscated - Cracked by Voxguard\AppFuscator.exe
    "C:\Users\Admin\AppData\Local\Temp\Appfuscated - Cracked by Voxguard\AppFuscator.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    PID:4116

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5b2da265-c206-438d-8fc7-2f5631fdadd1\AgileDotNetRT64.dll

    Filesize

    2.9MB

    MD5

    9bb6ed08af544d3738e60200d2804180

    SHA1

    5a40b484ca56b1ce59add4ec283e21d60070be02

    SHA256

    86d49f3894cc3de038abcde03803de8b6f239c237f34930ce5c41ab725c26cb7

    SHA512

    63e6b90457c3e3e6e419e30fe57e35c66e08059611fbe4ffb60d28acd6ee8d9f0ccfa31d7b27e9af44ab13512490f3b7b7f5130df947c5de50a937dcee0a91a5

  • C:\Users\Admin\AppData\Local\Temp\5b2da265-c206-438d-8fc7-2f5631fdadd1\AgileDotNetRT64.dll

    Filesize

    2.9MB

    MD5

    9bb6ed08af544d3738e60200d2804180

    SHA1

    5a40b484ca56b1ce59add4ec283e21d60070be02

    SHA256

    86d49f3894cc3de038abcde03803de8b6f239c237f34930ce5c41ab725c26cb7

    SHA512

    63e6b90457c3e3e6e419e30fe57e35c66e08059611fbe4ffb60d28acd6ee8d9f0ccfa31d7b27e9af44ab13512490f3b7b7f5130df947c5de50a937dcee0a91a5

  • memory/4116-144-0x00007FFE3E560000-0x00007FFE3E6AE000-memory.dmp

    Filesize

    1.3MB

  • memory/4116-140-0x000000001B6B0000-0x000000001B6C0000-memory.dmp

    Filesize

    64KB

  • memory/4116-141-0x00007FFE391B0000-0x00007FFE39962000-memory.dmp

    Filesize

    7.7MB

  • memory/4116-143-0x00007FFE391B0000-0x00007FFE39962000-memory.dmp

    Filesize

    7.7MB

  • memory/4116-133-0x0000000000310000-0x00000000008B2000-memory.dmp

    Filesize

    5.6MB

  • memory/4116-145-0x00000000028A0000-0x00000000028D4000-memory.dmp

    Filesize

    208KB

  • memory/4116-146-0x000000001B6B0000-0x000000001B6C0000-memory.dmp

    Filesize

    64KB

  • memory/4116-147-0x00007FFE391B0000-0x00007FFE39962000-memory.dmp

    Filesize

    7.7MB

  • memory/4116-148-0x000000001B6B0000-0x000000001B6C0000-memory.dmp

    Filesize

    64KB

  • memory/4116-149-0x000000001B6B0000-0x000000001B6C0000-memory.dmp

    Filesize

    64KB

  • memory/4116-152-0x00007FFE391B0000-0x00007FFE39962000-memory.dmp

    Filesize

    7.7MB

  • memory/4116-161-0x00007FFE391B0000-0x00007FFE39962000-memory.dmp

    Filesize

    7.7MB

  • memory/4116-162-0x00007FFE391B0000-0x00007FFE39962000-memory.dmp

    Filesize

    7.7MB