Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 14:24
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
General
-
Target
file.exe
-
Size
3.1MB
-
MD5
cae672ef9307c3d155014819b77063c4
-
SHA1
6f3fbd8eb2b3af226ae7d70245c9a5137ccd0582
-
SHA256
0c5fd6cbdbdd456d02395bda9ab44725d6cf2dc6660c66724c86e87a28f1639d
-
SHA512
1c8c6bb9a4acc7465fb3e7eba9a30b1f9478e5f9416587e218d5e9bc98389310f81210242549cfa991fed3b7b8a31058a646e5a5f9a0e9507cdfd70c8d26ee1d
-
SSDEEP
49152:9PvsG1OiyH6Rks0pVWwsY4m2n3nm7nE+2z/tgZnVQ2a0253ZyyORi/Us:xEsQH6is0pVqJnAEjgZnVQ3Zyy8s5
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe -
resource yara_rule behavioral1/memory/2356-0-0x00000000009B0000-0x00000000012CE000-memory.dmp themida behavioral1/memory/2356-2-0x00000000009B0000-0x00000000012CE000-memory.dmp themida behavioral1/memory/2356-3-0x00000000009B0000-0x00000000012CE000-memory.dmp themida behavioral1/memory/2356-4-0x00000000009B0000-0x00000000012CE000-memory.dmp themida behavioral1/memory/2356-5-0x00000000009B0000-0x00000000012CE000-memory.dmp themida behavioral1/memory/2356-6-0x00000000009B0000-0x00000000012CE000-memory.dmp themida behavioral1/memory/2356-7-0x00000000009B0000-0x00000000012CE000-memory.dmp themida behavioral1/memory/2356-9-0x00000000009B0000-0x00000000012CE000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2356 file.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2056 2356 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2056 2356 file.exe 28 PID 2356 wrote to memory of 2056 2356 file.exe 28 PID 2356 wrote to memory of 2056 2356 file.exe 28 PID 2356 wrote to memory of 2056 2356 file.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 1322⤵
- Program crash
PID:2056
-