General
-
Target
smartscreen_protected.exe
-
Size
2.9MB
-
Sample
240111-pmeg4agdh5
-
MD5
713b1c97b09d0e633ede2f62556e78b9
-
SHA1
c67835ca9504049a350fdb023ec7975cccce1674
-
SHA256
c33acab1ddbee95302f0d54feb1c49c40dec807cec251fb6d30d056f571155e0
-
SHA512
fadada8a709662a013a5b7984357d41fb004d3e600274ce2d067f081b246a6c8e764e104ff88c2131343d3a500a855ecd5990b968458d0bef5a1e5a15a99ee50
-
SSDEEP
49152:f9X3GwWO9gJdmbB6v6WELRkyVVgYgHUByjGw4JGP9zwYFHbXZkigd8ljRs1pit:f9pWO96dEu6WCQUBF1CdyiPsW
Behavioral task
behavioral1
Sample
smartscreen_protected.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
smartscreen_protected.exe
-
Size
2.9MB
-
MD5
713b1c97b09d0e633ede2f62556e78b9
-
SHA1
c67835ca9504049a350fdb023ec7975cccce1674
-
SHA256
c33acab1ddbee95302f0d54feb1c49c40dec807cec251fb6d30d056f571155e0
-
SHA512
fadada8a709662a013a5b7984357d41fb004d3e600274ce2d067f081b246a6c8e764e104ff88c2131343d3a500a855ecd5990b968458d0bef5a1e5a15a99ee50
-
SSDEEP
49152:f9X3GwWO9gJdmbB6v6WELRkyVVgYgHUByjGw4JGP9zwYFHbXZkigd8ljRs1pit:f9pWO96dEu6WCQUBF1CdyiPsW
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops desktop.ini file(s)
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-