Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-01-2024 15:51
Behavioral task
behavioral1
Sample
cheeto.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
cheeto.exe
-
Size
3.9MB
-
MD5
ec4784eb214b390523ce00434c723e1f
-
SHA1
2d6b5be71ce1547dfbcd209136d38925f4b4762f
-
SHA256
b52ca43121ef221e8de12a924e13239844d879c78d149a1085ca417b41487f9c
-
SHA512
c46ccd44a68fc1b424dfe5df889e896ae2741b764a58d333793dc5f247f4c6ec8d2867761bdd6ccfe258dcff982703e222402712d0de5b8e74317ff40873c973
-
SSDEEP
98304:DTAMLsl1C6SnTepFEKtAflzVU8fc4nf0jsfHld98NsaePZ:DTAde6eifEKtAfpVUqc4fAwd98CaeR
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cheeto.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cheeto.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cheeto.exe -
resource yara_rule behavioral1/memory/2356-0-0x000000013F620000-0x0000000140079000-memory.dmp themida behavioral1/memory/2356-1-0x000000013F620000-0x0000000140079000-memory.dmp themida behavioral1/memory/2356-2-0x000000013F620000-0x0000000140079000-memory.dmp themida behavioral1/memory/2356-3-0x000000013F620000-0x0000000140079000-memory.dmp themida behavioral1/memory/2356-4-0x000000013F620000-0x0000000140079000-memory.dmp themida behavioral1/memory/2356-5-0x000000013F620000-0x0000000140079000-memory.dmp themida behavioral1/memory/2356-6-0x000000013F620000-0x0000000140079000-memory.dmp themida behavioral1/memory/2356-7-0x000000013F620000-0x0000000140079000-memory.dmp themida behavioral1/memory/2356-8-0x000000013F620000-0x0000000140079000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cheeto.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2356 wrote to memory of 1744 2356 cheeto.exe 28 PID 2356 wrote to memory of 1744 2356 cheeto.exe 28 PID 2356 wrote to memory of 1744 2356 cheeto.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cheeto.exe"C:\Users\Admin\AppData\Local\Temp\cheeto.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2356 -s 8682⤵PID:1744
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\New Text Document.txt1⤵PID:2844