Analysis

  • max time kernel
    1748s
  • max time network
    1596s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-06-2023 12:29

General

  • Target

    HoYoKProtect.dll

  • Size

    35.2MB

  • MD5

    e5d96d21d67f7bad6c322e38ad07f923

  • SHA1

    e9522287a4899f2c635705d93c5791986fd34461

  • SHA256

    ce013c6c0390979c05021d83edac4fbce3aaed26bd3b5a4b38ad64fb50871826

  • SHA512

    f1772609552e1d39f4feb2e2fab9bb6738e4f1761843b7bdb59fc6ddb5c72d784ce024860f5b1da44daa840626018efbacd8cbd5320fe61cbf27145d3708c760

  • SSDEEP

    786432:RmJR64tcoCK+n6dw2Ptc5qWiTBW8PvyCA51rwigv:RO4K+n69RA8iCA70d

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Program crash 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\HoYoKProtect.dll,#1
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:5080
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 5080 -s 468
      2⤵
      • Program crash
      PID:2000
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 452 -p 5080 -ip 5080
    1⤵
      PID:1224

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5080-133-0x00007FF9AFE40000-0x00007FF9B270E000-memory.dmp

      Filesize

      40.8MB

    • memory/5080-137-0x00007FF9AFE40000-0x00007FF9B270E000-memory.dmp

      Filesize

      40.8MB