Analysis
-
max time kernel
144s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
06feaa71d2d3904adcbeabdb63d231cf.exe
Resource
win7-20231215-en
General
-
Target
06feaa71d2d3904adcbeabdb63d231cf.exe
-
Size
3.3MB
-
MD5
06feaa71d2d3904adcbeabdb63d231cf
-
SHA1
43b5e04884d63aff808fb2be7750df950bff9b52
-
SHA256
f464bc33739055f0a5b55c7d1563a6e42ff0b3d4ab9126c2cb62ea412d3aa108
-
SHA512
5e10139cdd4abbe7a0a1c686555449f802f1c84960c29c7f16c00168697337abf288b82761463686fe92dbf1561ec2621c9aca0a5bead7874d07d0498a07b95a
-
SSDEEP
98304:GK/oQWfgZgVAp9XbtPZTpzwM7zK9Ov9c47/FCJ:PAQ6gZgV0htPRpzZ/nVc24J
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 06feaa71d2d3904adcbeabdb63d231cf.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000600000002324b-5.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 3348 06feaa71d2d3904adcbeabdb63d231cf.exe -
resource yara_rule behavioral2/files/0x000600000002324b-5.dat upx behavioral2/memory/3348-9-0x0000000010000000-0x0000000010269000-memory.dmp upx behavioral2/memory/3348-10-0x0000000010000000-0x0000000010269000-memory.dmp upx behavioral2/memory/3348-13-0x0000000010000000-0x0000000010269000-memory.dmp upx behavioral2/memory/3348-17-0x0000000010000000-0x0000000010269000-memory.dmp upx behavioral2/memory/3348-38-0x0000000010000000-0x0000000010269000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3348 06feaa71d2d3904adcbeabdb63d231cf.exe 3348 06feaa71d2d3904adcbeabdb63d231cf.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD51ac5c1ebab271a7a1bbb135ef53ec609
SHA135691c21782b9b56e8ea35eede8887dcdc132cf5
SHA2564650b91b122db15673f54111b819fa8479ef0936bca691e617aca9c8d30c72c9
SHA512d0d62c148a3d85280bedab0618d4f63aa5347d4c29b4d928322a1560e538d20f1d1677488a7148e345224c846b11e7b4ef886e9dc95fbbf5ca270e605f1ac350