Overview
overview
9Static
static
7Appfuscato...or.exe
windows7-x64
9Appfuscato...or.exe
windows10-2004-x64
9Appfuscato...ib.dll
windows7-x64
1Appfuscato...ib.dll
windows10-2004-x64
1Appfuscato...db.dll
windows7-x64
1Appfuscato...db.dll
windows10-2004-x64
1Appfuscato...db.dll
windows7-x64
1Appfuscato...db.dll
windows10-2004-x64
1Appfuscato...ks.dll
windows7-x64
1Appfuscato...ks.dll
windows10-2004-x64
1Appfuscato...il.dll
windows7-x64
1Appfuscato...il.dll
windows10-2004-x64
1Appfuscato...on.dll
windows7-x64
1Appfuscato...on.dll
windows10-2004-x64
1Appfuscato...er.exe
windows7-x64
1Appfuscato...er.exe
windows10-2004-x64
1Appfuscato...er.exe
windows7-x64
1Appfuscato...er.exe
windows10-2004-x64
1Appfuscato...00.exe
windows7-x64
7Appfuscato...00.exe
windows10-2004-x64
7Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2023, 15:34
Behavioral task
behavioral1
Sample
Appfuscator Crack V2/AppFuscator.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Appfuscator Crack V2/AppFuscator.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
Appfuscator Crack V2/ICSharpCode.SharpZipLib.dll
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Appfuscator Crack V2/ICSharpCode.SharpZipLib.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Appfuscator Crack V2/Mono.Cecil.Mdb.dll
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Appfuscator Crack V2/Mono.Cecil.Mdb.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Appfuscator Crack V2/Mono.Cecil.Pdb.dll
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
Appfuscator Crack V2/Mono.Cecil.Pdb.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Appfuscator Crack V2/Mono.Cecil.Rocks.dll
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
Appfuscator Crack V2/Mono.Cecil.Rocks.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
Appfuscator Crack V2/Mono.Cecil.dll
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
Appfuscator Crack V2/Mono.Cecil.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Appfuscator Crack V2/Newtonsoft.Json.dll
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
Appfuscator Crack V2/Newtonsoft.Json.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
Appfuscator Crack V2/StackTraceDecoder.exe
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
Appfuscator Crack V2/StackTraceDecoder.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
Appfuscator Crack V2/WatermarkDecoder.exe
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
Appfuscator Crack V2/WatermarkDecoder.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
Appfuscator Crack V2/unins000.exe
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
Appfuscator Crack V2/unins000.exe
Resource
win10v2004-20230220-en
General
-
Target
Appfuscator Crack V2/AppFuscator.exe
-
Size
6.4MB
-
MD5
069bc1539b09eb79536cee398d67383f
-
SHA1
7145e990c38bb3520c2b1424757bcaad710801f9
-
SHA256
5e5d5817a92b59969f7ff4d60ed9e0f0da2a834878ef68d2e222b7548dbcd02d
-
SHA512
5bba9859040fe888c6b8a3b5ecaef666ed941d9dcb655743339787f6c4e726eb835f8ed552c66d6c97086fcc58ae90c59b4f6d3dac400c652a8bc3cbeb9726e6
-
SSDEEP
196608:SaBMZGIC9GeDVI5DKBWZlkgJedYs6LtYdEhqTgKD:3BuGNkYVI5DK2NNs6LtYdEhSp
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AppFuscator.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AppFuscator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AppFuscator.exe -
Loads dropped DLL 1 IoCs
pid Process 1596 AppFuscator.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/1596-133-0x0000000000FC0000-0x0000000001624000-memory.dmp agile_net -
resource yara_rule behavioral2/files/0x0002000000021b0d-139.dat themida behavioral2/files/0x0002000000021b0d-137.dat themida behavioral2/memory/1596-141-0x00007FFAE14C0000-0x00007FFAE1C72000-memory.dmp themida behavioral2/memory/1596-143-0x00007FFAE14C0000-0x00007FFAE1C72000-memory.dmp themida behavioral2/memory/1596-147-0x00007FFAE14C0000-0x00007FFAE1C72000-memory.dmp themida behavioral2/memory/1596-151-0x00007FFAE14C0000-0x00007FFAE1C72000-memory.dmp themida behavioral2/memory/1596-152-0x00007FFAE14C0000-0x00007FFAE1C72000-memory.dmp themida behavioral2/memory/1596-161-0x00007FFAE14C0000-0x00007FFAE1C72000-memory.dmp themida behavioral2/memory/1596-162-0x00007FFAE14C0000-0x00007FFAE1C72000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AppFuscator.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe 1596 AppFuscator.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Appfuscator Crack V2\AppFuscator.exe"C:\Users\Admin\AppData\Local\Temp\Appfuscator Crack V2\AppFuscator.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of FindShellTrayWindow
PID:1596
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD59bb6ed08af544d3738e60200d2804180
SHA15a40b484ca56b1ce59add4ec283e21d60070be02
SHA25686d49f3894cc3de038abcde03803de8b6f239c237f34930ce5c41ab725c26cb7
SHA51263e6b90457c3e3e6e419e30fe57e35c66e08059611fbe4ffb60d28acd6ee8d9f0ccfa31d7b27e9af44ab13512490f3b7b7f5130df947c5de50a937dcee0a91a5
-
Filesize
2.9MB
MD59bb6ed08af544d3738e60200d2804180
SHA15a40b484ca56b1ce59add4ec283e21d60070be02
SHA25686d49f3894cc3de038abcde03803de8b6f239c237f34930ce5c41ab725c26cb7
SHA51263e6b90457c3e3e6e419e30fe57e35c66e08059611fbe4ffb60d28acd6ee8d9f0ccfa31d7b27e9af44ab13512490f3b7b7f5130df947c5de50a937dcee0a91a5