Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe
Resource
win10v2004-20231215-en
General
-
Target
b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe
-
Size
4.8MB
-
MD5
192f74c4eb3a499b12d19184de60d5b1
-
SHA1
764dcd8cbeb93bbc06c040e2b1afe625fc5b07e2
-
SHA256
b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e
-
SHA512
975fa7be617ce1672c081e0010a20124ea255178aa56f2ff708451e02ee6c72fa6bb38a324d7c488d1725b2849fdfcaa6d0c3c241a2375271bef212ad0da5e3b
-
SSDEEP
98304:T8DpgICmUlkWKJ9FH8WSkLFGtfZdbHOZwqAR4tkt2ugknzQh:mCmGZE9FH8JcFGtR5tZR4it2uNnze
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe -
resource yara_rule behavioral1/memory/2412-18-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-20-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-21-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-19-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-24-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-26-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-30-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-28-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-33-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-35-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-37-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-39-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-41-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-49-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-51-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-56-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-54-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-47-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-45-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-58-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-60-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-67-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-64-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-62-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-68-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2412-69-0x0000000010000000-0x000000001003F000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2412 b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe -
Modifies registry class 13 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Wow6432Node\CLSID\{bc2dd8d9-d914-7356-957e-bec8bc4e}\LocalizedString = 731b8f8e95392a6fd6f166c7 b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\CcFWSettg.Category\CLSID\{c6449a13-ca74-3173-b2a9} b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\CcFWSettg.Category b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Wow6432Node\CLSID\{39677245-6848-2a5b-9a50-ded280ae} b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Wow6432Node b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Wow6432Node\CLSID b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\CompressedFolder\CLSID\Compression Type (hffl2669w) = 04b2c0504e3a908a b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Wow6432Node\CLSID\{bc2dd8d9-d914-7356-957e-bec8bc4e} b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\CompressedFolder\CLSID b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\CcFWSettg.Category\CLSID\{c6449a13-ca74-3173-b2a9}\pmygpgco = 47387c7dd277f372 b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\CompressedFolder b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\CcFWSettg.Category\CLSID b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Wow6432Node\CLSID\{39677245-6848-2a5b-9a50-ded280ae}\LocalizedString = 731b8f8e95392a6fd6f166c7 b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2412 b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2412 b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe 2412 b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe 2412 b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe"C:\Users\Admin\AppData\Local\Temp\b5e87155eab47adead7bab72a51bfdc40ca56b64e976186f09cc3e8438423c3e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2412