Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2023 18:53
General
-
Target
d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe
-
Size
2.0MB
-
MD5
8bb15c76e2d55780ced07a1a2c589486
-
SHA1
1c28776b212347e0746743db176820aecfeb20ea
-
SHA256
d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9
-
SHA512
516cdaa2fe2efcc18c5596723ce52f92b9f09b80a089b87e647e0ab807c69cc8e3310a894925674ad628baa32712e93074ffcc2e1a5fd61d5d2b15eb9b0a9a1d
-
SSDEEP
49152:dusT49TJp6obw7prohAAGQFEVxYL+7vAzieEdfr:FaPtGXVKEvAz+dr
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe -
Processes:
resource yara_rule behavioral1/memory/3636-142-0x0000000000F50000-0x00000000014D0000-memory.dmp themida behavioral1/memory/3636-183-0x0000000000F50000-0x00000000014D0000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Processes:
d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exepid process 3636 d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exedescription pid process target process PID 3636 set thread context of 3240 3636 d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exeAppLaunch.exepid process 3636 d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe 3636 d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe 3636 d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe 3636 d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe 3240 AppLaunch.exe 3240 AppLaunch.exe 3240 AppLaunch.exe 3240 AppLaunch.exe 3240 AppLaunch.exe 3240 AppLaunch.exe 3240 AppLaunch.exe 3240 AppLaunch.exe 3240 AppLaunch.exe 3240 AppLaunch.exe 3240 AppLaunch.exe 3240 AppLaunch.exe 3240 AppLaunch.exe 3240 AppLaunch.exe 3240 AppLaunch.exe 3240 AppLaunch.exe 3240 AppLaunch.exe 3240 AppLaunch.exe 3240 AppLaunch.exe 3240 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exedescription pid process Token: SeDebugPrivilege 3636 d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exedescription pid process target process PID 3636 wrote to memory of 4280 3636 d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe AppLaunch.exe PID 3636 wrote to memory of 4280 3636 d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe AppLaunch.exe PID 3636 wrote to memory of 4280 3636 d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe AppLaunch.exe PID 3636 wrote to memory of 3240 3636 d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe AppLaunch.exe PID 3636 wrote to memory of 3240 3636 d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe AppLaunch.exe PID 3636 wrote to memory of 3240 3636 d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe AppLaunch.exe PID 3636 wrote to memory of 3240 3636 d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe AppLaunch.exe PID 3636 wrote to memory of 3240 3636 d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe AppLaunch.exe PID 3636 wrote to memory of 3240 3636 d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe AppLaunch.exe PID 3636 wrote to memory of 3240 3636 d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe AppLaunch.exe PID 3636 wrote to memory of 3240 3636 d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe AppLaunch.exe PID 3636 wrote to memory of 3240 3636 d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe"C:\Users\Admin\AppData\Local\Temp\d9f6408b67628d5618a4fbaba97404ac55988633ccb2a02a09c95b0b134bafc9.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4280
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3240
-