Analysis
-
max time kernel
123s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2023 14:41
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230712-en
windows7-x64
11 signatures
150 seconds
General
-
Target
file.exe
-
Size
2.0MB
-
MD5
8bb15c76e2d55780ced07a1a2c589486
-
SHA1
1c28776b212347e0746743db176820aecfeb20ea
-
SHA256
d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9
-
SHA512
516cdaa2fe2efcc18c5596723ce52f92b9f09b80a089b87e647e0ab807c69cc8e3310a894925674ad628baa32712e93074ffcc2e1a5fd61d5d2b15eb9b0a9a1d
-
SSDEEP
49152:dusT49TJp6obw7prohAAGQFEVxYL+7vAzieEdfr:FaPtGXVKEvAz+dr
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
file.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
file.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe -
Processes:
resource yara_rule behavioral2/memory/3068-142-0x0000000000630000-0x0000000000BB0000-memory.dmp themida behavioral2/memory/3068-182-0x0000000000630000-0x0000000000BB0000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Processes:
file.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
file.exepid process 3068 file.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 3068 set thread context of 2380 3068 file.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
file.exeAppLaunch.exepid process 3068 file.exe 3068 file.exe 3068 file.exe 3068 file.exe 2380 AppLaunch.exe 2380 AppLaunch.exe 2380 AppLaunch.exe 2380 AppLaunch.exe 2380 AppLaunch.exe 2380 AppLaunch.exe 2380 AppLaunch.exe 2380 AppLaunch.exe 2380 AppLaunch.exe 2380 AppLaunch.exe 2380 AppLaunch.exe 2380 AppLaunch.exe 2380 AppLaunch.exe 2380 AppLaunch.exe 2380 AppLaunch.exe 2380 AppLaunch.exe 2380 AppLaunch.exe 2380 AppLaunch.exe 2380 AppLaunch.exe 2380 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
file.exedescription pid process Token: SeDebugPrivilege 3068 file.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
file.exedescription pid process target process PID 3068 wrote to memory of 1700 3068 file.exe AppLaunch.exe PID 3068 wrote to memory of 1700 3068 file.exe AppLaunch.exe PID 3068 wrote to memory of 1700 3068 file.exe AppLaunch.exe PID 3068 wrote to memory of 2380 3068 file.exe AppLaunch.exe PID 3068 wrote to memory of 2380 3068 file.exe AppLaunch.exe PID 3068 wrote to memory of 2380 3068 file.exe AppLaunch.exe PID 3068 wrote to memory of 2380 3068 file.exe AppLaunch.exe PID 3068 wrote to memory of 2380 3068 file.exe AppLaunch.exe PID 3068 wrote to memory of 2380 3068 file.exe AppLaunch.exe PID 3068 wrote to memory of 2380 3068 file.exe AppLaunch.exe PID 3068 wrote to memory of 2380 3068 file.exe AppLaunch.exe PID 3068 wrote to memory of 2380 3068 file.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1700
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380
-