Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01/09/2023, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
JC_5126f8d490dcbf38d6e05b0cb4b3bc4f9b85aa03ac9d813c84e55c15d9d85165.exe
Resource
win7-20230831-en
General
-
Target
JC_5126f8d490dcbf38d6e05b0cb4b3bc4f9b85aa03ac9d813c84e55c15d9d85165.exe
-
Size
2.4MB
-
MD5
cc94e6bf5facdbb6ba6bdf115da648f1
-
SHA1
8ccfa5597218e3c0976c0a11733eb458cd04ee77
-
SHA256
5126f8d490dcbf38d6e05b0cb4b3bc4f9b85aa03ac9d813c84e55c15d9d85165
-
SHA512
e86c7ce40c1d195fd5ec01e10c6308d0360efe8466ec9e6ac9112680c130e0c868393fb30c8c01ddc1870a431286971d140cf1cc70e8398d0c28dc13f425fe4e
-
SSDEEP
49152:Kquu8YgI4dHY5B1izK/5p+yUMo6XPzw37bVqRs+xI09m2Vsj4I:ADI55CzY5p+yF7XM7bYrIfosjr
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JC_5126f8d490dcbf38d6e05b0cb4b3bc4f9b85aa03ac9d813c84e55c15d9d85165.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JC_5126f8d490dcbf38d6e05b0cb4b3bc4f9b85aa03ac9d813c84e55c15d9d85165.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JC_5126f8d490dcbf38d6e05b0cb4b3bc4f9b85aa03ac9d813c84e55c15d9d85165.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Wine JC_5126f8d490dcbf38d6e05b0cb4b3bc4f9b85aa03ac9d813c84e55c15d9d85165.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JC_5126f8d490dcbf38d6e05b0cb4b3bc4f9b85aa03ac9d813c84e55c15d9d85165.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2820 JC_5126f8d490dcbf38d6e05b0cb4b3bc4f9b85aa03ac9d813c84e55c15d9d85165.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2820 JC_5126f8d490dcbf38d6e05b0cb4b3bc4f9b85aa03ac9d813c84e55c15d9d85165.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2820 JC_5126f8d490dcbf38d6e05b0cb4b3bc4f9b85aa03ac9d813c84e55c15d9d85165.exe 2820 JC_5126f8d490dcbf38d6e05b0cb4b3bc4f9b85aa03ac9d813c84e55c15d9d85165.exe 2820 JC_5126f8d490dcbf38d6e05b0cb4b3bc4f9b85aa03ac9d813c84e55c15d9d85165.exe 2820 JC_5126f8d490dcbf38d6e05b0cb4b3bc4f9b85aa03ac9d813c84e55c15d9d85165.exe 2820 JC_5126f8d490dcbf38d6e05b0cb4b3bc4f9b85aa03ac9d813c84e55c15d9d85165.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JC_5126f8d490dcbf38d6e05b0cb4b3bc4f9b85aa03ac9d813c84e55c15d9d85165.exe"C:\Users\Admin\AppData\Local\Temp\JC_5126f8d490dcbf38d6e05b0cb4b3bc4f9b85aa03ac9d813c84e55c15d9d85165.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2820