Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 02:24
Behavioral task
behavioral1
Sample
han.zo.exe
Resource
win7-20230831-en
11 signatures
150 seconds
General
-
Target
han.zo.exe
-
Size
5.3MB
-
MD5
aca3fea6cc9dc5976ad3136ebcfc44ea
-
SHA1
575eb7a336a17b36be250000e75ae2913da6d5fa
-
SHA256
8b146c775c240e02e3ce27f57fc952d6e1665e736603863b2599891894dd40f6
-
SHA512
d23e8df5b1b70255ca57cc9ba65e0d9b0eaf6792ec30c582c81e54e70fe871ed7badb450d18e9fe1e474168eab642a7f9589922d64763ff2da56a2492b5b3d7a
-
SSDEEP
98304:3jQvbYoGRoZhbWan0jaGIyyetHuRVrJf1xjjlWCzMXB6BVUEzdX50VHLI3Zra2XK:3jaGRkoanZeO3ThlmgV7dXG2U2sLN6y
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ han.zo.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion han.zo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion han.zo.exe -
resource yara_rule behavioral1/memory/2188-0-0x000000013FAC0000-0x00000001408C4000-memory.dmp themida behavioral1/memory/2188-2-0x000000013FAC0000-0x00000001408C4000-memory.dmp themida behavioral1/memory/2188-3-0x000000013FAC0000-0x00000001408C4000-memory.dmp themida behavioral1/memory/2188-4-0x000000013FAC0000-0x00000001408C4000-memory.dmp themida behavioral1/memory/2188-5-0x000000013FAC0000-0x00000001408C4000-memory.dmp themida behavioral1/memory/2188-6-0x000000013FAC0000-0x00000001408C4000-memory.dmp themida behavioral1/memory/2188-7-0x000000013FAC0000-0x00000001408C4000-memory.dmp themida behavioral1/memory/2188-8-0x000000013FAC0000-0x00000001408C4000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA han.zo.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2188 han.zo.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2892 sc.exe -
Kills process with taskkill 5 IoCs
pid Process 2632 taskkill.exe 2724 taskkill.exe 2856 taskkill.exe 2540 taskkill.exe 2512 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe 2188 han.zo.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2632 taskkill.exe Token: SeDebugPrivilege 2724 taskkill.exe Token: SeDebugPrivilege 2856 taskkill.exe Token: SeDebugPrivilege 2540 taskkill.exe Token: SeDebugPrivilege 2512 taskkill.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2188 wrote to memory of 3040 2188 han.zo.exe 29 PID 2188 wrote to memory of 3040 2188 han.zo.exe 29 PID 2188 wrote to memory of 3040 2188 han.zo.exe 29 PID 2188 wrote to memory of 2600 2188 han.zo.exe 30 PID 2188 wrote to memory of 2600 2188 han.zo.exe 30 PID 2188 wrote to memory of 2600 2188 han.zo.exe 30 PID 2600 wrote to memory of 2632 2600 cmd.exe 31 PID 2600 wrote to memory of 2632 2600 cmd.exe 31 PID 2600 wrote to memory of 2632 2600 cmd.exe 31 PID 2188 wrote to memory of 2896 2188 han.zo.exe 34 PID 2188 wrote to memory of 2896 2188 han.zo.exe 34 PID 2188 wrote to memory of 2896 2188 han.zo.exe 34 PID 2896 wrote to memory of 2724 2896 cmd.exe 33 PID 2896 wrote to memory of 2724 2896 cmd.exe 33 PID 2896 wrote to memory of 2724 2896 cmd.exe 33 PID 2188 wrote to memory of 2304 2188 han.zo.exe 35 PID 2188 wrote to memory of 2304 2188 han.zo.exe 35 PID 2188 wrote to memory of 2304 2188 han.zo.exe 35 PID 2304 wrote to memory of 2892 2304 cmd.exe 36 PID 2304 wrote to memory of 2892 2304 cmd.exe 36 PID 2304 wrote to memory of 2892 2304 cmd.exe 36 PID 2188 wrote to memory of 2352 2188 han.zo.exe 37 PID 2188 wrote to memory of 2352 2188 han.zo.exe 37 PID 2188 wrote to memory of 2352 2188 han.zo.exe 37 PID 2352 wrote to memory of 2856 2352 cmd.exe 38 PID 2352 wrote to memory of 2856 2352 cmd.exe 38 PID 2352 wrote to memory of 2856 2352 cmd.exe 38 PID 2188 wrote to memory of 2660 2188 han.zo.exe 39 PID 2188 wrote to memory of 2660 2188 han.zo.exe 39 PID 2188 wrote to memory of 2660 2188 han.zo.exe 39 PID 2660 wrote to memory of 2540 2660 cmd.exe 40 PID 2660 wrote to memory of 2540 2660 cmd.exe 40 PID 2660 wrote to memory of 2540 2660 cmd.exe 40 PID 2188 wrote to memory of 2504 2188 han.zo.exe 41 PID 2188 wrote to memory of 2504 2188 han.zo.exe 41 PID 2188 wrote to memory of 2504 2188 han.zo.exe 41 PID 2504 wrote to memory of 2512 2504 cmd.exe 42 PID 2504 wrote to memory of 2512 2504 cmd.exe 42 PID 2504 wrote to memory of 2512 2504 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\han.zo.exe"C:\Users\Admin\AppData\Local\Temp\han.zo.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2896
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:2892
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2724