Analysis
-
max time kernel
25s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 14:14
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
General
-
Target
Setup.exe
-
Size
6.8MB
-
MD5
f0f01fb9ad7ecab5d698da5679175f29
-
SHA1
314198b1a6cf81cd3b64a91f4eab5ad881ecff2c
-
SHA256
5f1c46da9e266b1f7f31953e593636c6b0e1968636e81e62e820122bfa40706f
-
SHA512
c67c093543bd7ef126801dd6e42a6864471dede82d35bdf9c2c508d63af9d0effd6ca312c37bc1261925ba027d4162543ce5267eb93eb5d14abf6d2b89fabf9c
-
SSDEEP
196608:+/Qr1IjiQrQg+2JraSvJ4NQ7Esnoy8aX8v:V1GiQrQ7HSvJRzoy8aXw
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup.exe -
resource yara_rule behavioral2/memory/2864-0-0x00007FF6A1F50000-0x00007FF6A3064000-memory.dmp themida behavioral2/memory/2864-2-0x00007FF6A1F50000-0x00007FF6A3064000-memory.dmp themida behavioral2/memory/2864-3-0x00007FF6A1F50000-0x00007FF6A3064000-memory.dmp themida behavioral2/memory/2864-4-0x00007FF6A1F50000-0x00007FF6A3064000-memory.dmp themida behavioral2/memory/2864-5-0x00007FF6A1F50000-0x00007FF6A3064000-memory.dmp themida behavioral2/memory/2864-6-0x00007FF6A1F50000-0x00007FF6A3064000-memory.dmp themida behavioral2/memory/2864-7-0x00007FF6A1F50000-0x00007FF6A3064000-memory.dmp themida behavioral2/memory/2864-8-0x00007FF6A1F50000-0x00007FF6A3064000-memory.dmp themida behavioral2/memory/2864-9-0x00007FF6A1F50000-0x00007FF6A3064000-memory.dmp themida behavioral2/memory/2864-10-0x00007FF6A1F50000-0x00007FF6A3064000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2864-3-0x00007FF6A1F50000-0x00007FF6A3064000-memory.dmp autoit_exe behavioral2/memory/2864-4-0x00007FF6A1F50000-0x00007FF6A3064000-memory.dmp autoit_exe behavioral2/memory/2864-5-0x00007FF6A1F50000-0x00007FF6A3064000-memory.dmp autoit_exe behavioral2/memory/2864-6-0x00007FF6A1F50000-0x00007FF6A3064000-memory.dmp autoit_exe behavioral2/memory/2864-7-0x00007FF6A1F50000-0x00007FF6A3064000-memory.dmp autoit_exe behavioral2/memory/2864-8-0x00007FF6A1F50000-0x00007FF6A3064000-memory.dmp autoit_exe behavioral2/memory/2864-9-0x00007FF6A1F50000-0x00007FF6A3064000-memory.dmp autoit_exe behavioral2/memory/2864-10-0x00007FF6A1F50000-0x00007FF6A3064000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2864 Setup.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2864 Setup.exe 2864 Setup.exe 2864 Setup.exe 2864 Setup.exe 2864 Setup.exe 2864 Setup.exe 2864 Setup.exe 2864 Setup.exe 2864 Setup.exe 2864 Setup.exe 2864 Setup.exe 2864 Setup.exe 2864 Setup.exe 2864 Setup.exe 2864 Setup.exe 2864 Setup.exe 2864 Setup.exe 2864 Setup.exe 2864 Setup.exe 2864 Setup.exe 2864 Setup.exe 2864 Setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2864