Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
26/11/2023, 01:01
Behavioral task
behavioral1
Sample
11baa23e47b7cf8b7f75cf19753154840744f0f4d01399598f34ec3fdae2fb77.exe
Resource
win7-20231023-en
General
-
Target
11baa23e47b7cf8b7f75cf19753154840744f0f4d01399598f34ec3fdae2fb77.exe
-
Size
3.1MB
-
MD5
11874b5a52ccae16235a8e27216c1ae5
-
SHA1
89b47396be6c21106b9f27538f032d1591fad95f
-
SHA256
11baa23e47b7cf8b7f75cf19753154840744f0f4d01399598f34ec3fdae2fb77
-
SHA512
e999336f87259294ccc033b4209b7eba7ff36735b492d38e466b55e1a59cb515b59c7911ff799b11ac07d9e1508566a62423f291615900e3a79494e4f9f86785
-
SSDEEP
49152:xsnF7LOcyDLSU+H2wD3uT8NdYT6bZ+LoKrrBa4LXIm8RWjgU0zvYfgC6jKCRkRhl:69acyMtiyZQrBa4LX78bOF6jvUl
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 11baa23e47b7cf8b7f75cf19753154840744f0f4d01399598f34ec3fdae2fb77.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 11baa23e47b7cf8b7f75cf19753154840744f0f4d01399598f34ec3fdae2fb77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 11baa23e47b7cf8b7f75cf19753154840744f0f4d01399598f34ec3fdae2fb77.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2968-24-0x0000000000090000-0x00000000009A0000-memory.dmp themida behavioral1/memory/2968-33-0x0000000000090000-0x00000000009A0000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 11baa23e47b7cf8b7f75cf19753154840744f0f4d01399598f34ec3fdae2fb77.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2968 11baa23e47b7cf8b7f75cf19753154840744f0f4d01399598f34ec3fdae2fb77.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2968 11baa23e47b7cf8b7f75cf19753154840744f0f4d01399598f34ec3fdae2fb77.exe 2968 11baa23e47b7cf8b7f75cf19753154840744f0f4d01399598f34ec3fdae2fb77.exe 2968 11baa23e47b7cf8b7f75cf19753154840744f0f4d01399598f34ec3fdae2fb77.exe 2968 11baa23e47b7cf8b7f75cf19753154840744f0f4d01399598f34ec3fdae2fb77.exe 2968 11baa23e47b7cf8b7f75cf19753154840744f0f4d01399598f34ec3fdae2fb77.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2968 11baa23e47b7cf8b7f75cf19753154840744f0f4d01399598f34ec3fdae2fb77.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11baa23e47b7cf8b7f75cf19753154840744f0f4d01399598f34ec3fdae2fb77.exe"C:\Users\Admin\AppData\Local\Temp\11baa23e47b7cf8b7f75cf19753154840744f0f4d01399598f34ec3fdae2fb77.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968