Analysis
-
max time kernel
192s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 05:06
Behavioral task
behavioral1
Sample
569f9924667f80f835bb9c459ced6be3.exe
Resource
win7-20231215-en
General
-
Target
569f9924667f80f835bb9c459ced6be3.exe
-
Size
4.0MB
-
MD5
569f9924667f80f835bb9c459ced6be3
-
SHA1
245d92ea8b7bdb1c5f345a31db021dc163fd680f
-
SHA256
aea4435244666380b895db36ff76c6f4cc1a79a820c2c3c94bb7b0936366635e
-
SHA512
fd0ba553fbe0c586edb4dd7096076569427f42f5f139a25b75d33099579e2367f6ead8aa64d9c0d7fc78c0d892d93784d00eba3bb85e783656bf227bf3b0bd9b
-
SSDEEP
49152:Y0lVwS9ld0t2LzZolUylfRpCZpMQTM/6xv8nT9593SbmS3/6:Y0HZ9l6t2LzZolhfRpCZVMx95dNO/6
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 569f9924667f80f835bb9c459ced6be3.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 569f9924667f80f835bb9c459ced6be3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 569f9924667f80f835bb9c459ced6be3.exe -
resource yara_rule behavioral2/memory/3820-0-0x0000000000560000-0x0000000000969000-memory.dmp themida behavioral2/memory/3820-1-0x0000000000560000-0x0000000000969000-memory.dmp themida behavioral2/memory/3820-3-0x0000000000560000-0x0000000000969000-memory.dmp themida behavioral2/memory/3820-4-0x0000000000560000-0x0000000000969000-memory.dmp themida behavioral2/memory/3820-8-0x0000000000560000-0x0000000000969000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 569f9924667f80f835bb9c459ced6be3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3820 569f9924667f80f835bb9c459ced6be3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3820 wrote to memory of 4296 3820 569f9924667f80f835bb9c459ced6be3.exe 93 PID 3820 wrote to memory of 4296 3820 569f9924667f80f835bb9c459ced6be3.exe 93 PID 3820 wrote to memory of 4296 3820 569f9924667f80f835bb9c459ced6be3.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\569f9924667f80f835bb9c459ced6be3.exe"C:\Users\Admin\AppData\Local\Temp\569f9924667f80f835bb9c459ced6be3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\38202AU4.bat" "C:\Users\Admin\AppData\Local\Temp\569f9924667f80f835bb9c459ced6be3.exe""2⤵PID:4296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33B
MD577fc02da961f38e33e8b07a0f0094a7b
SHA17c9536111b05ed5241a98203a66dc3a74d456e6d
SHA25699ad9a43956617a90d1c5d2822b81d31a2397d86f68f41b7249642bf06a3e582
SHA512f62aa357604cc0c7654cb46717e9638ba3d25b5cfac2fa9ac926621bd7d10c1dc5ef283c159ba82e642d8b43a1f5fb29434f7945fcf05b9fdf51c06b11a4718a