Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 19:49
Static task
static1
Behavioral task
behavioral1
Sample
echo-F82C61-Nzg2Njg3-l=RtNp-f.exe
Resource
win7-20231215-en
7 signatures
150 seconds
General
-
Target
echo-F82C61-Nzg2Njg3-l=RtNp-f.exe
-
Size
15.9MB
-
MD5
fbb2df189ef881accd51591bd08e6049
-
SHA1
163fb496ff085356745a7db39513046311b9101b
-
SHA256
cd601f67c1725d57b8a4239378eef72baabd3f50b42967318c3864a2b0c51ecb
-
SHA512
2d2b9efdd47af0214ca4a7f9b92100dfb8a3c19f9179a860c53967fda39c99e8164dea9eafe43f9a09544dedd877ee2ad0e812eae214ed11abe475ec741748de
-
SSDEEP
196608:jCHz+d/TzVVzrkGwQ4vvuY6bX7jeYg+pyatKY8:2T+dzsGwPvDEX7jeYgPtY8
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ echo-F82C61-Nzg2Njg3-l=RtNp-f.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion echo-F82C61-Nzg2Njg3-l=RtNp-f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion echo-F82C61-Nzg2Njg3-l=RtNp-f.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA echo-F82C61-Nzg2Njg3-l=RtNp-f.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3400 echo-F82C61-Nzg2Njg3-l=RtNp-f.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3400 echo-F82C61-Nzg2Njg3-l=RtNp-f.exe 3400 echo-F82C61-Nzg2Njg3-l=RtNp-f.exe 3400 echo-F82C61-Nzg2Njg3-l=RtNp-f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3400 echo-F82C61-Nzg2Njg3-l=RtNp-f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3400 echo-F82C61-Nzg2Njg3-l=RtNp-f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\echo-F82C61-Nzg2Njg3-l=RtNp-f.exe"C:\Users\Admin\AppData\Local\Temp\echo-F82C61-Nzg2Njg3-l=RtNp-f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3400