Analysis

  • max time kernel
    192s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 05:06

General

  • Target

    569f9924667f80f835bb9c459ced6be3.exe

  • Size

    4.0MB

  • MD5

    569f9924667f80f835bb9c459ced6be3

  • SHA1

    245d92ea8b7bdb1c5f345a31db021dc163fd680f

  • SHA256

    aea4435244666380b895db36ff76c6f4cc1a79a820c2c3c94bb7b0936366635e

  • SHA512

    fd0ba553fbe0c586edb4dd7096076569427f42f5f139a25b75d33099579e2367f6ead8aa64d9c0d7fc78c0d892d93784d00eba3bb85e783656bf227bf3b0bd9b

  • SSDEEP

    49152:Y0lVwS9ld0t2LzZolUylfRpCZpMQTM/6xv8nT9593SbmS3/6:Y0HZ9l6t2LzZolhfRpCZVMx95dNO/6

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 5 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\569f9924667f80f835bb9c459ced6be3.exe
    "C:\Users\Admin\AppData\Local\Temp\569f9924667f80f835bb9c459ced6be3.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:3820
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\38202AU4.bat" "C:\Users\Admin\AppData\Local\Temp\569f9924667f80f835bb9c459ced6be3.exe""
      2⤵
        PID:4296

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\38202AU4.bat

      Filesize

      33B

      MD5

      77fc02da961f38e33e8b07a0f0094a7b

      SHA1

      7c9536111b05ed5241a98203a66dc3a74d456e6d

      SHA256

      99ad9a43956617a90d1c5d2822b81d31a2397d86f68f41b7249642bf06a3e582

      SHA512

      f62aa357604cc0c7654cb46717e9638ba3d25b5cfac2fa9ac926621bd7d10c1dc5ef283c159ba82e642d8b43a1f5fb29434f7945fcf05b9fdf51c06b11a4718a

    • memory/3820-0-0x0000000000560000-0x0000000000969000-memory.dmp

      Filesize

      4.0MB

    • memory/3820-1-0x0000000000560000-0x0000000000969000-memory.dmp

      Filesize

      4.0MB

    • memory/3820-2-0x0000000077084000-0x0000000077086000-memory.dmp

      Filesize

      8KB

    • memory/3820-3-0x0000000000560000-0x0000000000969000-memory.dmp

      Filesize

      4.0MB

    • memory/3820-4-0x0000000000560000-0x0000000000969000-memory.dmp

      Filesize

      4.0MB

    • memory/3820-8-0x0000000000560000-0x0000000000969000-memory.dmp

      Filesize

      4.0MB