Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2023, 04:09
Static task
static1
Behavioral task
behavioral1
Sample
87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe
Resource
win10v2004-20230915-en
General
-
Target
87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe
-
Size
8.9MB
-
MD5
e128ebed804142607f503a1dd11d665d
-
SHA1
29b60008640585a9c71c0c4dc43f9270c5cae5cc
-
SHA256
87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c
-
SHA512
566511851cd60a38e6d890b4c4118ec28fd6a40040f5043be6fbe88224338c2a4ef181e13f865900e6f97b24c9573390850228ec6a42afbbc7436b9b597d184b
-
SSDEEP
196608:h6FZgcdFdcz/IC4LprUX4qWoTvby+FaJfhBQ3ThrcEW:hD6cz/ICkrUIqWiuP/Edt
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe -
resource yara_rule behavioral2/memory/1280-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1280-54-0x0000000010000000-0x000000001003E000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe 1280 87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe"C:\Users\Admin\AppData\Local\Temp\87e15d2cc803930c325374216caff0e395638cd4cfc97644db8a3b9a0b52012c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1280