Analysis
-
max time kernel
144s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 01:02
Behavioral task
behavioral1
Sample
227fdef5c8697118435703ff7213e84d.exe
Resource
win7-20231129-en
4 signatures
150 seconds
General
-
Target
227fdef5c8697118435703ff7213e84d.exe
-
Size
3.0MB
-
MD5
227fdef5c8697118435703ff7213e84d
-
SHA1
89170f5f3608d4820b530dc41bf66b34fb5cb3e8
-
SHA256
90e822d8377ac840ccb3ff73fff68271f9b811b21cb7577de7325e43b597cca5
-
SHA512
fa2be82bba321a100e24dec6ff1f19a922c79d00c9217c2de0fa0ecc17d9e59354d17743dd0060285ee85b8461946277616015e3c75cfd395b2c9a2cf17d6d79
-
SSDEEP
49152:Z8zCMDSga61oIlg7GE9MNRFO6eeim1yg1ug+AufX9x48NYLy+pyv:a2MDSU1oJChN6ifFcuy
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 227fdef5c8697118435703ff7213e84d.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 227fdef5c8697118435703ff7213e84d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 227fdef5c8697118435703ff7213e84d.exe -
resource yara_rule behavioral2/memory/4520-0-0x0000000000400000-0x0000000000C3F000-memory.dmp upx behavioral2/memory/4520-1-0x0000000000400000-0x0000000000C3F000-memory.dmp upx behavioral2/memory/4520-2-0x0000000000400000-0x0000000000C3F000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 227fdef5c8697118435703ff7213e84d.exe