Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22-07-2023 14:41
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230712-en
windows7-x64
11 signatures
150 seconds
General
-
Target
file.exe
-
Size
2.0MB
-
MD5
8bb15c76e2d55780ced07a1a2c589486
-
SHA1
1c28776b212347e0746743db176820aecfeb20ea
-
SHA256
d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9
-
SHA512
516cdaa2fe2efcc18c5596723ce52f92b9f09b80a089b87e647e0ab807c69cc8e3310a894925674ad628baa32712e93074ffcc2e1a5fd61d5d2b15eb9b0a9a1d
-
SSDEEP
49152:dusT49TJp6obw7prohAAGQFEVxYL+7vAzieEdfr:FaPtGXVKEvAz+dr
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
file.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
file.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe -
Processes:
resource yara_rule behavioral1/memory/2624-63-0x0000000000BB0000-0x0000000001130000-memory.dmp themida behavioral1/memory/2624-108-0x0000000000BB0000-0x0000000001130000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Processes:
file.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
file.exepid process 2624 file.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 2624 set thread context of 2864 2624 file.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
file.exeAppLaunch.exepid process 2624 file.exe 2864 AppLaunch.exe 2864 AppLaunch.exe 2864 AppLaunch.exe 2864 AppLaunch.exe 2864 AppLaunch.exe 2864 AppLaunch.exe 2864 AppLaunch.exe 2864 AppLaunch.exe 2864 AppLaunch.exe 2864 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
file.exedescription pid process Token: SeDebugPrivilege 2624 file.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
file.exedescription pid process target process PID 2624 wrote to memory of 2864 2624 file.exe AppLaunch.exe PID 2624 wrote to memory of 2864 2624 file.exe AppLaunch.exe PID 2624 wrote to memory of 2864 2624 file.exe AppLaunch.exe PID 2624 wrote to memory of 2864 2624 file.exe AppLaunch.exe PID 2624 wrote to memory of 2864 2624 file.exe AppLaunch.exe PID 2624 wrote to memory of 2864 2624 file.exe AppLaunch.exe PID 2624 wrote to memory of 2864 2624 file.exe AppLaunch.exe PID 2624 wrote to memory of 2864 2624 file.exe AppLaunch.exe PID 2624 wrote to memory of 2864 2624 file.exe AppLaunch.exe PID 2624 wrote to memory of 2864 2624 file.exe AppLaunch.exe PID 2624 wrote to memory of 2864 2624 file.exe AppLaunch.exe PID 2624 wrote to memory of 2864 2624 file.exe AppLaunch.exe PID 2624 wrote to memory of 2864 2624 file.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864
-