Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-09-2023 23:52
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20230831-en
General
-
Target
Loader.exe
-
Size
44.2MB
-
MD5
3717f7d447fa2e11b78085b70b4db53d
-
SHA1
4fdceba008248c134f1ec61b16968816716b0140
-
SHA256
cc566bd4e3bab54426f4940e6817ff0a1e0be39bfd2ece80cce4ee0c0674e02d
-
SHA512
a6c942095ace315c77934ac2eff9f5535d992342abee31b8a2c328e694499c28ee71a3d9fb80351f9dfd62cb28c4eb73fb00563dae71f02fb6759c2c29e64ee2
-
SSDEEP
786432:yte4pWy7IuSLAtMXnjj/o0nGsJqNdT8biIY9eZOtuhq+4J/EjXbF:yte4UuSLAiXnjj1k7gnaeZOEh74JkbF
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Loader.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Loader.exe -
resource yara_rule behavioral1/memory/2360-1-0x000000013FD80000-0x0000000140D80000-memory.dmp themida behavioral1/memory/2360-2-0x000000013FD80000-0x0000000140D80000-memory.dmp themida behavioral1/memory/2360-3-0x000000013FD80000-0x0000000140D80000-memory.dmp themida behavioral1/memory/2360-6-0x000000013FD80000-0x0000000140D80000-memory.dmp themida behavioral1/memory/2360-7-0x000000013FD80000-0x0000000140D80000-memory.dmp themida behavioral1/memory/2360-9-0x000000013FD80000-0x0000000140D80000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Loader.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2869} Loader.exe File opened for modification C:\Windows\System32\IME\IMETC\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2899} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2444} Loader.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2360 Loader.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-UPDATE} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2893} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2892} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2932 reg.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2360 Loader.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 1892 powercfg.exe Token: SeShutdownPrivilege 1892 powercfg.exe Token: SeShutdownPrivilege 1892 powercfg.exe Token: SeShutdownPrivilege 1892 powercfg.exe Token: SeShutdownPrivilege 1892 powercfg.exe Token: SeCreatePagefilePrivilege 1892 powercfg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2360 Loader.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2012 2360 Loader.exe 28 PID 2360 wrote to memory of 2012 2360 Loader.exe 28 PID 2360 wrote to memory of 2012 2360 Loader.exe 28 PID 2012 wrote to memory of 1892 2012 cmd.exe 30 PID 2012 wrote to memory of 1892 2012 cmd.exe 30 PID 2012 wrote to memory of 1892 2012 cmd.exe 30 PID 2360 wrote to memory of 2684 2360 Loader.exe 32 PID 2360 wrote to memory of 2684 2360 Loader.exe 32 PID 2360 wrote to memory of 2684 2360 Loader.exe 32 PID 2684 wrote to memory of 2932 2684 cmd.exe 33 PID 2684 wrote to memory of 2932 2684 cmd.exe 33 PID 2684 wrote to memory of 2932 2684 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Powercfg -h off2⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\system32\powercfg.exePowercfg -h off3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:2932
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1