Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 12:49
Behavioral task
behavioral1
Sample
mqrKShBvko.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
General
-
Target
mqrKShBvko.exe
-
Size
11.2MB
-
MD5
cdc7fd69069b2ad98d2b33a633eaf98b
-
SHA1
b69fc19b195cd2d11416cddb675c79921817af6d
-
SHA256
2971daa775ebab4f40852e097af9421be3dc46d271d2ce06f0daba6893dfe0f3
-
SHA512
03a241e6b5d157f82e92bdd9611a7ba62d5a8c03a12831d9c684b76cab58b3dec17b6b542de09b73c63594f4f770d25acec7d06a586e284b50af411c7def81b6
-
SSDEEP
196608:7p4QZqMFGkcNYuwPZ/bpo6kxYKURFqIhmdL1qo:7TtGt0zcmKURFq2m
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ mqrKShBvko.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mqrKShBvko.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mqrKShBvko.exe -
resource yara_rule behavioral1/memory/1680-1-0x000000013FCC0000-0x00000001413C9000-memory.dmp themida behavioral1/memory/1680-2-0x000000013FCC0000-0x00000001413C9000-memory.dmp themida behavioral1/memory/1680-3-0x000000013FCC0000-0x00000001413C9000-memory.dmp themida behavioral1/memory/1680-4-0x000000013FCC0000-0x00000001413C9000-memory.dmp themida behavioral1/memory/1680-5-0x000000013FCC0000-0x00000001413C9000-memory.dmp themida behavioral1/memory/1680-6-0x000000013FCC0000-0x00000001413C9000-memory.dmp themida behavioral1/memory/1680-7-0x000000013FCC0000-0x00000001413C9000-memory.dmp themida behavioral1/memory/1680-8-0x000000013FCC0000-0x00000001413C9000-memory.dmp themida behavioral1/memory/1680-9-0x000000013FCC0000-0x00000001413C9000-memory.dmp themida behavioral1/memory/1680-10-0x000000013FCC0000-0x00000001413C9000-memory.dmp themida behavioral1/memory/1680-11-0x000000013FCC0000-0x00000001413C9000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mqrKShBvko.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1680 mqrKShBvko.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1680 mqrKShBvko.exe Token: SeDebugPrivilege 1680 mqrKShBvko.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2180 1680 mqrKShBvko.exe 28 PID 1680 wrote to memory of 2180 1680 mqrKShBvko.exe 28 PID 1680 wrote to memory of 2180 1680 mqrKShBvko.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\mqrKShBvko.exe"C:\Users\Admin\AppData\Local\Temp\mqrKShBvko.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1680 -s 3682⤵PID:2180
-