Analysis

  • max time kernel
    15s
  • max time network
    76s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 09:42

General

  • Target

    1d0e7128-600a-4cb0-bd24-2cd796196c5b.exe

  • Size

    7.2MB

  • MD5

    4c7684a4360434b04675d6c487da975d

  • SHA1

    489957f952e23489e23ff9d554192fadcffc0558

  • SHA256

    53f8c34a9cd8f479aa1339080fe94d0a0858f24457f51b54875bc7a30850739b

  • SHA512

    9f32864401d44b89b8a5d8c08bcf3a4be9f79322cd2f0bf4ae9eb604caa588fd7143d3c9fb4c60fe56eb4eb4842dd8648c36fed96e135f2d3baaf57a2f7a6266

  • SSDEEP

    98304:R2AlRbG2sxCunjhlw6AC3bEG8uBj7ULdyjdlcxNdeXK1AUPfjHBLxZZoMd7+fC4X:Plcp/QIdlcx6XKSUPfltZqM6CU1BNDbb

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 10 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d0e7128-600a-4cb0-bd24-2cd796196c5b.exe
    "C:\Users\Admin\AppData\Local\Temp\1d0e7128-600a-4cb0-bd24-2cd796196c5b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1460
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /C Get-Service -Name WpnUserService* | Restart-Service -Force
      2⤵
        PID:2452

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_w13fn2h0.iht.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • memory/1460-0-0x00007FF7BFA20000-0x00007FF7C0C78000-memory.dmp

            Filesize

            18.3MB

          • memory/1460-1-0x00007FF995D90000-0x00007FF995F85000-memory.dmp

            Filesize

            2.0MB

          • memory/1460-2-0x00007FF7BFA20000-0x00007FF7C0C78000-memory.dmp

            Filesize

            18.3MB

          • memory/1460-3-0x00007FF7BFA20000-0x00007FF7C0C78000-memory.dmp

            Filesize

            18.3MB

          • memory/1460-4-0x00007FF7BFA20000-0x00007FF7C0C78000-memory.dmp

            Filesize

            18.3MB

          • memory/1460-5-0x00007FF7BFA20000-0x00007FF7C0C78000-memory.dmp

            Filesize

            18.3MB

          • memory/1460-6-0x00007FF7BFA20000-0x00007FF7C0C78000-memory.dmp

            Filesize

            18.3MB

          • memory/1460-7-0x00007FF7BFA20000-0x00007FF7C0C78000-memory.dmp

            Filesize

            18.3MB

          • memory/1460-8-0x00007FF7BFA20000-0x00007FF7C0C78000-memory.dmp

            Filesize

            18.3MB

          • memory/1460-9-0x00007FF7BFA20000-0x00007FF7C0C78000-memory.dmp

            Filesize

            18.3MB

          • memory/1460-13-0x00007FF7BFA20000-0x00007FF7C0C78000-memory.dmp

            Filesize

            18.3MB