Analysis
-
max time kernel
79s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 10:41
Behavioral task
behavioral1
Sample
Extreme Injector v3.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
slap v1.28.exe
Resource
win10v2004-20231215-en
9 signatures
150 seconds
Behavioral task
behavioral3
Sample
slap_crack.dll
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
slap v1.28.exe
-
Size
7.3MB
-
MD5
cde2a1b5aa17584d9dcd5eb8e6239124
-
SHA1
065bc349cc88f86c6a8cd94921bca8f39b658883
-
SHA256
876c4492ec205277298130817cbdf2c8428823ea38b7bf741ac9aa3c0f7e84ce
-
SHA512
680f12afdaec31307a27b6ad3b7fad22d107982842b8b57180361ce8a7b0adbd9af179ca94fdad21dee7a9568a4248aea4230403abeedc92ca00967e422e1435
-
SSDEEP
196608:yt3+1ekELwe4Mqyit6MJEkpIH+4oDlOk5r/y:W3+nkwLM8tTJEkpIH+zDD9/
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ slap v1.28.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion slap v1.28.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion slap v1.28.exe -
resource yara_rule behavioral2/memory/3512-0-0x00007FF671120000-0x00007FF6721EF000-memory.dmp themida behavioral2/memory/3512-2-0x00007FF671120000-0x00007FF6721EF000-memory.dmp themida behavioral2/memory/3512-3-0x00007FF671120000-0x00007FF6721EF000-memory.dmp themida behavioral2/memory/3512-4-0x00007FF671120000-0x00007FF6721EF000-memory.dmp themida behavioral2/memory/3512-5-0x00007FF671120000-0x00007FF6721EF000-memory.dmp themida behavioral2/memory/3512-6-0x00007FF671120000-0x00007FF6721EF000-memory.dmp themida behavioral2/memory/3512-7-0x00007FF671120000-0x00007FF6721EF000-memory.dmp themida behavioral2/memory/3512-8-0x00007FF671120000-0x00007FF6721EF000-memory.dmp themida behavioral2/memory/3512-9-0x00007FF671120000-0x00007FF6721EF000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slap v1.28.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3512 slap v1.28.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4808 taskmgr.exe 4808 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4808 taskmgr.exe Token: SeSystemProfilePrivilege 4808 taskmgr.exe Token: SeCreateGlobalPrivilege 4808 taskmgr.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\slap v1.28.exe"C:\Users\Admin\AppData\Local\Temp\slap v1.28.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3512
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4808