Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 00:51
Static task
static1
Behavioral task
behavioral1
Sample
Miguel.Native.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Miguel.Native.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Miguel.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Miguel.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
tls.exe
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
tls.exe
Resource
win10v2004-20230915-en
General
-
Target
Miguel.exe
-
Size
13.4MB
-
MD5
bfd318d90ab40a0e40fda4bb6b15df2c
-
SHA1
e70596be98fba1036d20944f5e91fa6f91071787
-
SHA256
420fba038b5073047a43e7fd510db996130db78a18d6b2f7ebe6b1a369be9a13
-
SHA512
c3185c8180e26aa50a1ffe7132eb7b44fab168d0980156e8039ecf6509fed990ec6f4af5bb0ba1b144d3ef24a0bd817581e08fc72c2f9af44ff2fff83f89bbd1
-
SSDEEP
393216:1wyg366TM+va9OgViuaDZeoPJBDKRBrDD:1wyg36JE6azP7aDD
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Miguel.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Miguel.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Miguel.exe -
Loads dropped DLL 1 IoCs
pid Process 224 Miguel.exe -
resource yara_rule behavioral4/memory/224-13-0x0000000180000000-0x0000000181261000-memory.dmp themida behavioral4/memory/224-21-0x0000000180000000-0x0000000181261000-memory.dmp themida behavioral4/memory/224-25-0x000000001DC30000-0x000000001E58C000-memory.dmp themida behavioral4/memory/224-26-0x0000000180000000-0x0000000181261000-memory.dmp themida behavioral4/memory/224-27-0x0000000180000000-0x0000000181261000-memory.dmp themida behavioral4/memory/224-28-0x0000000180000000-0x0000000181261000-memory.dmp themida behavioral4/memory/224-29-0x0000000180000000-0x0000000181261000-memory.dmp themida behavioral4/memory/224-30-0x0000000180000000-0x0000000181261000-memory.dmp themida behavioral4/memory/224-31-0x0000000180000000-0x0000000181261000-memory.dmp themida behavioral4/memory/224-42-0x0000000180000000-0x0000000181261000-memory.dmp themida behavioral4/memory/224-44-0x0000000180000000-0x0000000181261000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Miguel.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 224 Miguel.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Miguel.exe"C:\Users\Admin\AppData\Local\Temp\Miguel.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD509d1ba104d339bd427897a7b869e097a
SHA1c889b5bd38c9640b8c3677ef7aa10da9fd75338d
SHA2568a267fe0f2238ffba077c53668bcd6fb7a0dbc326f1e6396a3cd8aafb9d21168
SHA512ed996049b3bfbcc29f5f36bf078f7afcfa243705c67c8328ca60ebd83badf09c221897a898e7406ff2524c76439b85ae33e847a8f4c64b7035b7a1ed0a8546df