Analysis
-
max time kernel
152s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 02:24
Behavioral task
behavioral1
Sample
han.zo.exe
Resource
win7-20230831-en
11 signatures
150 seconds
General
-
Target
han.zo.exe
-
Size
5.3MB
-
MD5
aca3fea6cc9dc5976ad3136ebcfc44ea
-
SHA1
575eb7a336a17b36be250000e75ae2913da6d5fa
-
SHA256
8b146c775c240e02e3ce27f57fc952d6e1665e736603863b2599891894dd40f6
-
SHA512
d23e8df5b1b70255ca57cc9ba65e0d9b0eaf6792ec30c582c81e54e70fe871ed7badb450d18e9fe1e474168eab642a7f9589922d64763ff2da56a2492b5b3d7a
-
SSDEEP
98304:3jQvbYoGRoZhbWan0jaGIyyetHuRVrJf1xjjlWCzMXB6BVUEzdX50VHLI3Zra2XK:3jaGRkoanZeO3ThlmgV7dXG2U2sLN6y
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ han.zo.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion han.zo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion han.zo.exe -
resource yara_rule behavioral2/memory/2548-0-0x00007FF659750000-0x00007FF65A554000-memory.dmp themida behavioral2/memory/2548-2-0x00007FF659750000-0x00007FF65A554000-memory.dmp themida behavioral2/memory/2548-3-0x00007FF659750000-0x00007FF65A554000-memory.dmp themida behavioral2/memory/2548-4-0x00007FF659750000-0x00007FF65A554000-memory.dmp themida behavioral2/memory/2548-5-0x00007FF659750000-0x00007FF65A554000-memory.dmp themida behavioral2/memory/2548-6-0x00007FF659750000-0x00007FF65A554000-memory.dmp themida behavioral2/memory/2548-7-0x00007FF659750000-0x00007FF65A554000-memory.dmp themida behavioral2/memory/2548-8-0x00007FF659750000-0x00007FF65A554000-memory.dmp themida behavioral2/memory/2548-9-0x00007FF659750000-0x00007FF65A554000-memory.dmp themida behavioral2/memory/2548-10-0x00007FF659750000-0x00007FF65A554000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA han.zo.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2548 han.zo.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 964 sc.exe -
Kills process with taskkill 5 IoCs
pid Process 2520 taskkill.exe 1764 taskkill.exe 1252 taskkill.exe 3960 taskkill.exe 4952 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe 2548 han.zo.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3960 taskkill.exe Token: SeDebugPrivilege 4952 taskkill.exe Token: SeDebugPrivilege 2520 taskkill.exe Token: SeDebugPrivilege 1764 taskkill.exe Token: SeDebugPrivilege 1252 taskkill.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2988 2548 han.zo.exe 94 PID 2548 wrote to memory of 2988 2548 han.zo.exe 94 PID 2548 wrote to memory of 4008 2548 han.zo.exe 95 PID 2548 wrote to memory of 4008 2548 han.zo.exe 95 PID 2988 wrote to memory of 3960 2988 cmd.exe 96 PID 2988 wrote to memory of 3960 2988 cmd.exe 96 PID 2548 wrote to memory of 1776 2548 han.zo.exe 97 PID 2548 wrote to memory of 1776 2548 han.zo.exe 97 PID 1776 wrote to memory of 4952 1776 cmd.exe 98 PID 1776 wrote to memory of 4952 1776 cmd.exe 98 PID 2548 wrote to memory of 112 2548 han.zo.exe 99 PID 2548 wrote to memory of 112 2548 han.zo.exe 99 PID 112 wrote to memory of 964 112 cmd.exe 100 PID 112 wrote to memory of 964 112 cmd.exe 100 PID 2548 wrote to memory of 1388 2548 han.zo.exe 101 PID 2548 wrote to memory of 1388 2548 han.zo.exe 101 PID 1388 wrote to memory of 2520 1388 cmd.exe 102 PID 1388 wrote to memory of 2520 1388 cmd.exe 102 PID 2548 wrote to memory of 1872 2548 han.zo.exe 103 PID 2548 wrote to memory of 1872 2548 han.zo.exe 103 PID 1872 wrote to memory of 1764 1872 cmd.exe 104 PID 1872 wrote to memory of 1764 1872 cmd.exe 104 PID 2548 wrote to memory of 3840 2548 han.zo.exe 105 PID 2548 wrote to memory of 3840 2548 han.zo.exe 105 PID 3840 wrote to memory of 1252 3840 cmd.exe 106 PID 3840 wrote to memory of 1252 3840 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\han.zo.exe"C:\Users\Admin\AppData\Local\Temp\han.zo.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4008
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:964
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-