Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
18-09-2023 10:17
Behavioral task
behavioral1
Sample
8f7c7aadf506d8850c65d6fad2646438.exe
Resource
win7-20230831-en
windows7-x64
10 signatures
150 seconds
General
-
Target
8f7c7aadf506d8850c65d6fad2646438.exe
-
Size
5.1MB
-
MD5
8f7c7aadf506d8850c65d6fad2646438
-
SHA1
0d45d3ea30740a2a6df523396cf143dd59ebeec7
-
SHA256
eb8455a49caa35beaa645fb26a4b760a84e2abcce810b9261518fc978d6027c9
-
SHA512
17e1a00dd04694a95760c93e20d878e5956b215ecff1eb5dba917719ddff8587d9fddeb0bd7008a6e248859a83d2446310f8fc4cfddbcd44cb4ca2b1f6b4bf53
-
SSDEEP
98304:sbpLElLpmF74U66BS5vdypRR67nVUEFUCfbN1xi0zCB/Rr97XJ:sbpLEFpmKU66BYVyr4nV7+Crxi0Ur9T
Malware Config
Signatures
-
Raccoon Stealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2160-3-0x0000000000400000-0x0000000000F93000-memory.dmp family_raccoon behavioral1/memory/2160-4-0x0000000000400000-0x0000000000F93000-memory.dmp family_raccoon -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
8f7c7aadf506d8850c65d6fad2646438.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8f7c7aadf506d8850c65d6fad2646438.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
8f7c7aadf506d8850c65d6fad2646438.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8f7c7aadf506d8850c65d6fad2646438.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8f7c7aadf506d8850c65d6fad2646438.exe -
Processes:
resource yara_rule behavioral1/memory/2160-0-0x0000000000400000-0x0000000000F93000-memory.dmp themida behavioral1/memory/2160-2-0x0000000000400000-0x0000000000F93000-memory.dmp themida behavioral1/memory/2160-3-0x0000000000400000-0x0000000000F93000-memory.dmp themida behavioral1/memory/2160-4-0x0000000000400000-0x0000000000F93000-memory.dmp themida -
Processes:
8f7c7aadf506d8850c65d6fad2646438.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8f7c7aadf506d8850c65d6fad2646438.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
8f7c7aadf506d8850c65d6fad2646438.exepid Process 2160 8f7c7aadf506d8850c65d6fad2646438.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2896 2160 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
8f7c7aadf506d8850c65d6fad2646438.exepid Process 2160 8f7c7aadf506d8850c65d6fad2646438.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
8f7c7aadf506d8850c65d6fad2646438.exedescription pid Process procid_target PID 2160 wrote to memory of 2896 2160 8f7c7aadf506d8850c65d6fad2646438.exe 31 PID 2160 wrote to memory of 2896 2160 8f7c7aadf506d8850c65d6fad2646438.exe 31 PID 2160 wrote to memory of 2896 2160 8f7c7aadf506d8850c65d6fad2646438.exe 31 PID 2160 wrote to memory of 2896 2160 8f7c7aadf506d8850c65d6fad2646438.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f7c7aadf506d8850c65d6fad2646438.exe"C:\Users\Admin\AppData\Local\Temp\8f7c7aadf506d8850c65d6fad2646438.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 91242⤵
- Program crash
PID:2896
-