Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2023 22:11
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230712-en
windows7-x64
10 signatures
150 seconds
General
-
Target
file.exe
-
Size
4.3MB
-
MD5
bde9513eb616939033b2b642189c5870
-
SHA1
c2efe843df7108b22e16352c0fa07b50bae4f1c5
-
SHA256
e1b966305ebae686d323721f58e845ce4a4532e9ad8daacfa67f723b3986bf6d
-
SHA512
6d359b0cb8aa93e34c14a12ad47f9cfda0ad6cc4f77d2287f379498986961674afc5225f0717ba8ed7a926d371166b25e9d5c5509a5d44e9f7440df568b53590
-
SSDEEP
98304:u0hdjrfXqL1GoAhrqXd03u8g2EsfGfERiyU+RIGlP:uIdjr4GNZkCbg2dCEMynOyP
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3044-0-0x0000000000330000-0x0000000000E9A000-memory.dmp themida behavioral2/memory/3044-2-0x0000000000330000-0x0000000000E9A000-memory.dmp themida behavioral2/memory/3044-3-0x0000000000330000-0x0000000000E9A000-memory.dmp themida behavioral2/memory/3044-4-0x0000000000330000-0x0000000000E9A000-memory.dmp themida behavioral2/memory/3044-5-0x0000000000330000-0x0000000000E9A000-memory.dmp themida behavioral2/memory/3044-6-0x0000000000330000-0x0000000000E9A000-memory.dmp themida behavioral2/memory/3044-7-0x0000000000330000-0x0000000000E9A000-memory.dmp themida behavioral2/memory/3044-8-0x0000000000330000-0x0000000000E9A000-memory.dmp themida behavioral2/memory/3044-11-0x0000000000330000-0x0000000000E9A000-memory.dmp themida behavioral2/memory/3044-12-0x0000000000330000-0x0000000000E9A000-memory.dmp themida behavioral2/memory/3044-13-0x0000000000330000-0x0000000000E9A000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3044 file.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe 3044 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3044 file.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044