Analysis

  • max time kernel
    137s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/01/2024, 13:10

General

  • Target

    LDR.exe

  • Size

    10.4MB

  • MD5

    e42925429a22a958683eeeba04ff1e19

  • SHA1

    731eaba39ec46165a15f79fa739af57382f3a842

  • SHA256

    799dbf0b2c7792f3945379c9e7fb4d6e8996e1e5cecdf2b68eef395f8034e651

  • SHA512

    f820545a2b0009ed79c4bf7999ccc1091b7d88e20e0c74c562a467a96f17d20423b4a9f751754f095114784f794e2322bf572e11b082b4d6f444ffd6e6548fd7

  • SSDEEP

    196608:VFeI8pAbyqEyT1WGMF8trjvy41c1QajSJsMEkJPmpm1ljvKX/WWmFtC/0JrtcdR:VFJZbytyxtyccygSyK+m1ljyvTmLWe5e

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LDR.exe
    "C:\Users\Admin\AppData\Local\Temp\LDR.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:3952

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3952-0-0x0000000140000000-0x0000000141450000-memory.dmp

          Filesize

          20.3MB

        • memory/3952-1-0x0000000140000000-0x0000000141450000-memory.dmp

          Filesize

          20.3MB

        • memory/3952-2-0x0000000140000000-0x0000000141450000-memory.dmp

          Filesize

          20.3MB

        • memory/3952-3-0x0000000140000000-0x0000000141450000-memory.dmp

          Filesize

          20.3MB

        • memory/3952-4-0x00007FF948D30000-0x00007FF948F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3952-5-0x00007FF948F30000-0x00007FF948F32000-memory.dmp

          Filesize

          8KB

        • memory/3952-6-0x0000000140000000-0x0000000141450000-memory.dmp

          Filesize

          20.3MB

        • memory/3952-8-0x0000000140000000-0x0000000141450000-memory.dmp

          Filesize

          20.3MB

        • memory/3952-7-0x0000000140000000-0x0000000141450000-memory.dmp

          Filesize

          20.3MB

        • memory/3952-9-0x0000000140000000-0x0000000141450000-memory.dmp

          Filesize

          20.3MB

        • memory/3952-10-0x0000000140000000-0x0000000141450000-memory.dmp

          Filesize

          20.3MB

        • memory/3952-11-0x0000000140000000-0x0000000141450000-memory.dmp

          Filesize

          20.3MB

        • memory/3952-12-0x0000000140000000-0x0000000141450000-memory.dmp

          Filesize

          20.3MB

        • memory/3952-25-0x0000000140000000-0x0000000141450000-memory.dmp

          Filesize

          20.3MB

        • memory/3952-26-0x0000000140000000-0x0000000141450000-memory.dmp

          Filesize

          20.3MB

        • memory/3952-27-0x00007FF948D30000-0x00007FF948F25000-memory.dmp

          Filesize

          2.0MB