Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-02-2024 07:37
Static task
static1
Behavioral task
behavioral1
Sample
8bc410247879293843b610d977821c62.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8bc410247879293843b610d977821c62.exe
Resource
win10v2004-20231215-en
General
-
Target
8bc410247879293843b610d977821c62.exe
-
Size
1.6MB
-
MD5
8bc410247879293843b610d977821c62
-
SHA1
1b9b6c5b64da9805dc8c8ce8c31fd919a6dd1198
-
SHA256
c20150dd9ae0dc825c4e904ebc4ada0ac790ff78cd4e4486599b8e514abfc992
-
SHA512
64eddc5edd7b7b98d626cf30b8d70ea86cb92b2f15d040431a2a24662b7e64be168f1373f52bb880cd8263e08ea290dc49c2b30d8e15edd47e78f932528882d3
-
SSDEEP
24576:VMipUtH/GJUANicIoR0qwDEM6SmlKmWeyUCRvuQZUGavLVSsCcu+JiCf:VHkHeJUAA2ZB8TeYlKkwiA
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8bc410247879293843b610d977821c62.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8bc410247879293843b610d977821c62.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8bc410247879293843b610d977821c62.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Wine 8bc410247879293843b610d977821c62.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2312-1-0x0000000000F70000-0x0000000001180000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2312 8bc410247879293843b610d977821c62.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2608 2312 8bc410247879293843b610d977821c62.exe 28 PID 2312 wrote to memory of 2608 2312 8bc410247879293843b610d977821c62.exe 28 PID 2312 wrote to memory of 2608 2312 8bc410247879293843b610d977821c62.exe 28 PID 2312 wrote to memory of 2608 2312 8bc410247879293843b610d977821c62.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bc410247879293843b610d977821c62.exe"C:\Users\Admin\AppData\Local\Temp\8bc410247879293843b610d977821c62.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:2608
-