General

  • Target

    smartscreen_protected.exe

  • Size

    2.9MB

  • Sample

    240111-pmeg4agdh5

  • MD5

    713b1c97b09d0e633ede2f62556e78b9

  • SHA1

    c67835ca9504049a350fdb023ec7975cccce1674

  • SHA256

    c33acab1ddbee95302f0d54feb1c49c40dec807cec251fb6d30d056f571155e0

  • SHA512

    fadada8a709662a013a5b7984357d41fb004d3e600274ce2d067f081b246a6c8e764e104ff88c2131343d3a500a855ecd5990b968458d0bef5a1e5a15a99ee50

  • SSDEEP

    49152:f9X3GwWO9gJdmbB6v6WELRkyVVgYgHUByjGw4JGP9zwYFHbXZkigd8ljRs1pit:f9pWO96dEu6WCQUBF1CdyiPsW

Malware Config

Targets

    • Target

      smartscreen_protected.exe

    • Size

      2.9MB

    • MD5

      713b1c97b09d0e633ede2f62556e78b9

    • SHA1

      c67835ca9504049a350fdb023ec7975cccce1674

    • SHA256

      c33acab1ddbee95302f0d54feb1c49c40dec807cec251fb6d30d056f571155e0

    • SHA512

      fadada8a709662a013a5b7984357d41fb004d3e600274ce2d067f081b246a6c8e764e104ff88c2131343d3a500a855ecd5990b968458d0bef5a1e5a15a99ee50

    • SSDEEP

      49152:f9X3GwWO9gJdmbB6v6WELRkyVVgYgHUByjGw4JGP9zwYFHbXZkigd8ljRs1pit:f9pWO96dEu6WCQUBF1CdyiPsW

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks