Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 17:01
Behavioral task
behavioral1
Sample
fa96568cafcd981ba20c25cb6f495741.exe
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
General
-
Target
fa96568cafcd981ba20c25cb6f495741.exe
-
Size
2.8MB
-
MD5
fa96568cafcd981ba20c25cb6f495741
-
SHA1
4be72716153bb2a4acd1f36c46abfc34587c302d
-
SHA256
f279d57b245dd5b32b14ad8eb2a1a6289243c8d0c3e303b699e00c3533d3f099
-
SHA512
f01c7007918be64676329e1c8c783f6857c77ff3ea6e07c140290743cb05b1c385e92bae9cef678fca458cbbe26a7f1476889c878f8904ffbb9b7328ca3055e8
-
SSDEEP
49152:ajJ+weNu/j5yvHXVBFtycTBU0aLrfCrtWVnRTGPYLSkN3xzgS04Jn4BLFw9H:kuyaXjFL1aL0AVRTGAOC3BHFZOFw9H
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fa96568cafcd981ba20c25cb6f495741.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fa96568cafcd981ba20c25cb6f495741.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fa96568cafcd981ba20c25cb6f495741.exe -
resource yara_rule behavioral1/memory/3044-0-0x0000000000400000-0x0000000000B85000-memory.dmp themida behavioral1/memory/3044-2-0x0000000000400000-0x0000000000B85000-memory.dmp themida behavioral1/memory/3044-3-0x0000000000400000-0x0000000000B85000-memory.dmp themida behavioral1/memory/3044-1-0x0000000000400000-0x0000000000B85000-memory.dmp themida behavioral1/memory/3044-4-0x0000000000400000-0x0000000000B85000-memory.dmp themida behavioral1/memory/3044-7-0x0000000000400000-0x0000000000B85000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fa96568cafcd981ba20c25cb6f495741.exe