Analysis
-
max time kernel
292s -
max time network
270s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2023, 15:24
Static task
static1
General
-
Target
Electron.exe
-
Size
3.9MB
-
MD5
28564f4fbb6558373cbb82469ef2587d
-
SHA1
2c8f089df7a8d2dfce7c4c29af2db6eda5940d80
-
SHA256
e9f944ab296bcaa235eb584d6b7fa2811fc1a0f3bc2596a99675cdd114cdfcf5
-
SHA512
5e1df4736aaa9008ac7922a242ec15fb6644b90973880c378182f11d14834b431ead370684f1abf7c93dcdb3f1518f068a9c8bc459e4572ce19c8178374b7021
-
SSDEEP
98304:xkKnhd6yuxhRsHHfrIHj8yBzAziXOhhFa:mEhoyuEHcjJBzAzJhhFa
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Electron.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Electron.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Electron.exe -
Loads dropped DLL 2 IoCs
pid Process 3316 Electron.exe 3316 Electron.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Electron.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3316 Electron.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3316 Electron.exe 3316 Electron.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Electron.exe"C:\Users\Admin\AppData\Local\Temp\Electron.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
418KB
MD5f342d254fdd33e76b2fd6a3f8b517de3
SHA179c91621ea96a6635e3934e9b46dcf23d1fc762e
SHA2568ccde337ed97230a54e20db8608e3e74e6dbe3f4d153846a07484c2fa5ae596a
SHA512618963615db38d9ead4855555e7ca7558b0f3c9cc425a950e3f3457d49a5b50645fc9718a0693398d07bc1d822067e9fd8289d45f889586884daf25aedeb6cba
-
Filesize
418KB
MD5f342d254fdd33e76b2fd6a3f8b517de3
SHA179c91621ea96a6635e3934e9b46dcf23d1fc762e
SHA2568ccde337ed97230a54e20db8608e3e74e6dbe3f4d153846a07484c2fa5ae596a
SHA512618963615db38d9ead4855555e7ca7558b0f3c9cc425a950e3f3457d49a5b50645fc9718a0693398d07bc1d822067e9fd8289d45f889586884daf25aedeb6cba