Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 00:31
Behavioral task
behavioral1
Sample
08a5440af0d456a01d427eba64f3b6ce.exe
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
08a5440af0d456a01d427eba64f3b6ce.exe
-
Size
2.8MB
-
MD5
08a5440af0d456a01d427eba64f3b6ce
-
SHA1
4aa8c97832661ea8a8a4398a16e82719e966b48a
-
SHA256
7e6949dfc72dcaf6813b1866fc5f23772ecda804acd096b93b45ae29ab157408
-
SHA512
e34cc772635d69d37cfa1a7b7caec915936b45339dfbee5484f1b6b9ef995a02e977c1b260932cf2cce985a0f099ac65379bcb293cb6e8cd90fbb226e6731fbe
-
SSDEEP
49152:W8zCMDSgaXkBkmCYnlDpnM1pwnvV7G/dllXesaJye8CUj7TU74meS5r7yv:V2MDS6kODpnSpwnvV6/dDXF2yYcA4mXJ
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 08a5440af0d456a01d427eba64f3b6ce.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 08a5440af0d456a01d427eba64f3b6ce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 08a5440af0d456a01d427eba64f3b6ce.exe -
resource yara_rule behavioral1/memory/1800-0-0x0000000000400000-0x0000000000BD9000-memory.dmp upx behavioral1/memory/1800-1-0x0000000000400000-0x0000000000BD9000-memory.dmp upx behavioral1/memory/1800-2-0x0000000000400000-0x0000000000BD9000-memory.dmp upx behavioral1/memory/1800-5-0x0000000000400000-0x0000000000BD9000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 08a5440af0d456a01d427eba64f3b6ce.exe