Analysis
-
max time kernel
1748s -
max time network
1596s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2023 12:29
Behavioral task
behavioral1
Sample
HoYoKProtect.dll
Resource
win10v2004-20230220-en
windows10-2004-x64
6 signatures
1800 seconds
General
-
Target
HoYoKProtect.dll
-
Size
35.2MB
-
MD5
e5d96d21d67f7bad6c322e38ad07f923
-
SHA1
e9522287a4899f2c635705d93c5791986fd34461
-
SHA256
ce013c6c0390979c05021d83edac4fbce3aaed26bd3b5a4b38ad64fb50871826
-
SHA512
f1772609552e1d39f4feb2e2fab9bb6738e4f1761843b7bdb59fc6ddb5c72d784ce024860f5b1da44daa840626018efbacd8cbd5320fe61cbf27145d3708c760
-
SSDEEP
786432:RmJR64tcoCK+n6dw2Ptc5qWiTBW8PvyCA51rwigv:RO4K+n69RA8iCA70d
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
resource yara_rule behavioral1/memory/5080-133-0x00007FF9AFE40000-0x00007FF9B270E000-memory.dmp themida behavioral1/memory/5080-137-0x00007FF9AFE40000-0x00007FF9B270E000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5080 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2000 5080 WerFault.exe 63
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\HoYoKProtect.dll,#11⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5080 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5080 -s 4682⤵
- Program crash
PID:2000
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 452 -p 5080 -ip 50801⤵PID:1224