Analysis
-
max time kernel
54s -
max time network
62s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2023, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
Warehub_Nova_New_Interface_2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Warehub_Nova_New_Interface_2.exe
Resource
win10v2004-20230915-en
General
-
Target
Warehub_Nova_New_Interface_2.exe
-
Size
12.8MB
-
MD5
bda719bb15bfb020769ca3286ed546d5
-
SHA1
a50fff9224aeedaa81bdc075d0414c26e5fcacde
-
SHA256
e47cb33f11d4c2c8c7bc853e0a13ae38d1f762ea196ac31dd699a5d1dabcd8e2
-
SHA512
c210d6f40ebcb12980bf2e096165c82d51f861be5e94cb001a1e66ada4e483d61662a8d1a0c31d2f55260f5bd99b8852822aad7cfa730e7218336ee22becabd2
-
SSDEEP
196608:eCLzhlNSOMoR94Hk8IlUBFSmYPWZpQzznz+Yd4I2r0TEToTq9/WTkwPWUxsTBpYF:l/Nd8IlUBu2pi4I2rq3q9IgoM
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Warehub_Nova_New_Interface_2.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions Warehub_Nova_New_Interface_2.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Warehub_Nova_New_Interface_2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Warehub_Nova_New_Interface_2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 36 api.ipify.org 37 api.ipify.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 4788 Warehub_Nova_New_Interface_2.exe 4788 Warehub_Nova_New_Interface_2.exe 4788 Warehub_Nova_New_Interface_2.exe 4788 Warehub_Nova_New_Interface_2.exe 4788 Warehub_Nova_New_Interface_2.exe 4788 Warehub_Nova_New_Interface_2.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN Warehub_Nova_New_Interface_2.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4788 Warehub_Nova_New_Interface_2.exe 4788 Warehub_Nova_New_Interface_2.exe 4788 Warehub_Nova_New_Interface_2.exe 4788 Warehub_Nova_New_Interface_2.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4788 wrote to memory of 4944 4788 Warehub_Nova_New_Interface_2.exe 92 PID 4788 wrote to memory of 4944 4788 Warehub_Nova_New_Interface_2.exe 92 PID 4944 wrote to memory of 2592 4944 cmd.exe 93 PID 4944 wrote to memory of 2592 4944 cmd.exe 93 PID 4944 wrote to memory of 4464 4944 cmd.exe 94 PID 4944 wrote to memory of 4464 4944 cmd.exe 94 PID 4944 wrote to memory of 2996 4944 cmd.exe 95 PID 4944 wrote to memory of 2996 4944 cmd.exe 95 PID 4788 wrote to memory of 2168 4788 Warehub_Nova_New_Interface_2.exe 97 PID 4788 wrote to memory of 2168 4788 Warehub_Nova_New_Interface_2.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\Warehub_Nova_New_Interface_2.exe"C:\Users\Admin\AppData\Local\Temp\Warehub_Nova_New_Interface_2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Warehub_Nova_New_Interface_2.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Warehub_Nova_New_Interface_2.exe" MD53⤵PID:2592
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:4464
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2996
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause >nul2⤵PID:2168
-