Analysis
-
max time kernel
15s -
max time network
76s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 09:42
General
-
Target
1d0e7128-600a-4cb0-bd24-2cd796196c5b.exe
-
Size
7.2MB
-
MD5
4c7684a4360434b04675d6c487da975d
-
SHA1
489957f952e23489e23ff9d554192fadcffc0558
-
SHA256
53f8c34a9cd8f479aa1339080fe94d0a0858f24457f51b54875bc7a30850739b
-
SHA512
9f32864401d44b89b8a5d8c08bcf3a4be9f79322cd2f0bf4ae9eb604caa588fd7143d3c9fb4c60fe56eb4eb4842dd8648c36fed96e135f2d3baaf57a2f7a6266
-
SSDEEP
98304:R2AlRbG2sxCunjhlw6AC3bEG8uBj7ULdyjdlcxNdeXK1AUPfjHBLxZZoMd7+fC4X:Plcp/QIdlcx6XKSUPfltZqM6CU1BNDbb
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1d0e7128-600a-4cb0-bd24-2cd796196c5b.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1d0e7128-600a-4cb0-bd24-2cd796196c5b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1d0e7128-600a-4cb0-bd24-2cd796196c5b.exe -
resource yara_rule behavioral1/memory/1460-0-0x00007FF7BFA20000-0x00007FF7C0C78000-memory.dmp themida behavioral1/memory/1460-2-0x00007FF7BFA20000-0x00007FF7C0C78000-memory.dmp themida behavioral1/memory/1460-3-0x00007FF7BFA20000-0x00007FF7C0C78000-memory.dmp themida behavioral1/memory/1460-4-0x00007FF7BFA20000-0x00007FF7C0C78000-memory.dmp themida behavioral1/memory/1460-5-0x00007FF7BFA20000-0x00007FF7C0C78000-memory.dmp themida behavioral1/memory/1460-6-0x00007FF7BFA20000-0x00007FF7C0C78000-memory.dmp themida behavioral1/memory/1460-7-0x00007FF7BFA20000-0x00007FF7C0C78000-memory.dmp themida behavioral1/memory/1460-8-0x00007FF7BFA20000-0x00007FF7C0C78000-memory.dmp themida behavioral1/memory/1460-9-0x00007FF7BFA20000-0x00007FF7C0C78000-memory.dmp themida behavioral1/memory/1460-13-0x00007FF7BFA20000-0x00007FF7C0C78000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1d0e7128-600a-4cb0-bd24-2cd796196c5b.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1460 1d0e7128-600a-4cb0-bd24-2cd796196c5b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d0e7128-600a-4cb0-bd24-2cd796196c5b.exe"C:\Users\Admin\AppData\Local\Temp\1d0e7128-600a-4cb0-bd24-2cd796196c5b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1460 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /C Get-Service -Name WpnUserService* | Restart-Service -Force2⤵PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82