Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 03:23
Behavioral task
behavioral1
Sample
4ffd17b3b30170253a216e0f96e9588e.exe
Resource
win7-20231215-en
8 signatures
150 seconds
General
-
Target
4ffd17b3b30170253a216e0f96e9588e.exe
-
Size
3.2MB
-
MD5
4ffd17b3b30170253a216e0f96e9588e
-
SHA1
b9f1b49fc8cdfca89dd7e19ca13171d40ff7d867
-
SHA256
0d5d3419a81569a6728611f22160b49d2241600a68d6395747aa8b3469ac6105
-
SHA512
39e33ece5f5018c8cb9843d97e18f5ec13cb57bd4becf0f657fe2a21968d937b5215e508b8702ee800311862f950e3871740a3c5c5d569b05af266455db826ff
-
SSDEEP
98304:rjIr9rqFpcA6FSonqPZK6z6BBFQ3gjnvuRJpKTLsvRtv2:wkpcAvocluBQQaDpKP8o
Malware Config
Signatures
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/1796-23-0x00000000009E0000-0x0000000001264000-memory.dmp family_sectoprat behavioral1/memory/1796-24-0x00000000009E0000-0x0000000001264000-memory.dmp family_sectoprat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4ffd17b3b30170253a216e0f96e9588e.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4ffd17b3b30170253a216e0f96e9588e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4ffd17b3b30170253a216e0f96e9588e.exe -
resource yara_rule behavioral1/memory/1796-23-0x00000000009E0000-0x0000000001264000-memory.dmp themida behavioral1/memory/1796-24-0x00000000009E0000-0x0000000001264000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4ffd17b3b30170253a216e0f96e9588e.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1796 4ffd17b3b30170253a216e0f96e9588e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1796 4ffd17b3b30170253a216e0f96e9588e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ffd17b3b30170253a216e0f96e9588e.exe"C:\Users\Admin\AppData\Local\Temp\4ffd17b3b30170253a216e0f96e9588e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1796