Overview
overview
9Static
static
7MegaHackIn...47.dll
windows7-x64
3MegaHackIn...47.dll
windows10-2004-x64
3MegaHackIn...er.exe
windows7-x64
9MegaHackIn...er.exe
windows10-2004-x64
9MegaHackIn...re.dll
windows7-x64
1MegaHackIn...re.dll
windows10-2004-x64
3MegaHackIn...ui.dll
windows7-x64
1MegaHackIn...ui.dll
windows10-2004-x64
1MegaHackIn...rk.dll
windows7-x64
3MegaHackIn...rk.dll
windows10-2004-x64
3MegaHackIn...vg.dll
windows7-x64
3MegaHackIn...vg.dll
windows10-2004-x64
3MegaHackIn...ts.dll
windows7-x64
3MegaHackIn...ts.dll
windows10-2004-x64
3MegaHackIn...er.dll
windows7-x64
1MegaHackIn...er.dll
windows10-2004-x64
1MegaHackIn...on.dll
windows7-x64
1MegaHackIn...on.dll
windows10-2004-x64
1MegaHackIn...if.dll
windows7-x64
1MegaHackIn...if.dll
windows10-2004-x64
1MegaHackIn...ns.dll
windows7-x64
1MegaHackIn...ns.dll
windows10-2004-x64
1MegaHackIn...co.dll
windows7-x64
1MegaHackIn...co.dll
windows10-2004-x64
1MegaHackIn...eg.dll
windows7-x64
1MegaHackIn...eg.dll
windows10-2004-x64
1MegaHackIn...vg.dll
windows7-x64
1MegaHackIn...vg.dll
windows10-2004-x64
1MegaHackIn...ga.dll
windows7-x64
1MegaHackIn...ga.dll
windows10-2004-x64
1MegaHackIn...ff.dll
windows7-x64
1MegaHackIn...ff.dll
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 01:18
Behavioral task
behavioral1
Sample
MegaHackInstaller/D3Dcompiler_47.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
MegaHackInstaller/D3Dcompiler_47.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
MegaHackInstaller/MegaHackInstaller.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
MegaHackInstaller/MegaHackInstaller.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
MegaHackInstaller/Qt5Core.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
MegaHackInstaller/Qt5Core.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
MegaHackInstaller/Qt5Gui.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
MegaHackInstaller/Qt5Gui.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
MegaHackInstaller/Qt5Network.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
MegaHackInstaller/Qt5Network.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
MegaHackInstaller/Qt5Svg.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
MegaHackInstaller/Qt5Svg.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
MegaHackInstaller/Qt5Widgets.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
MegaHackInstaller/Qt5Widgets.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
MegaHackInstaller/bearer/qgenericbearer.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
MegaHackInstaller/bearer/qgenericbearer.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
MegaHackInstaller/iconengines/qsvgicon.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
MegaHackInstaller/iconengines/qsvgicon.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
MegaHackInstaller/imageformats/qgif.dll
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
MegaHackInstaller/imageformats/qgif.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
MegaHackInstaller/imageformats/qicns.dll
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
MegaHackInstaller/imageformats/qicns.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
MegaHackInstaller/imageformats/qico.dll
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
MegaHackInstaller/imageformats/qico.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
MegaHackInstaller/imageformats/qjpeg.dll
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
MegaHackInstaller/imageformats/qjpeg.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
MegaHackInstaller/imageformats/qsvg.dll
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
MegaHackInstaller/imageformats/qsvg.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral29
Sample
MegaHackInstaller/imageformats/qtga.dll
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
MegaHackInstaller/imageformats/qtga.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
MegaHackInstaller/imageformats/qtiff.dll
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
MegaHackInstaller/imageformats/qtiff.dll
Resource
win10v2004-20231215-en
General
-
Target
MegaHackInstaller/MegaHackInstaller.exe
-
Size
4.2MB
-
MD5
df36e1cd968c7336fe4f29094e4099f9
-
SHA1
2034e5f5d130dbf71c7e6ac82f8dbf808cfbd5c4
-
SHA256
e840c1a894e7b96d401845f37f634204dccf23fb23f73e847131e8467cb62524
-
SHA512
47778a6a1aa96ac8a2b5acb1208562df8b2e9e053d21cae9a8077b5d072d3661449c0e33444b4b19c4c1774a89663077df03668cef45108b5a92ae508fb02f37
-
SSDEEP
98304:Qj2MjWxUAAWc0fnpTBTgY4EaIsSYK39B9Biih/nIGm9:Q6MEkWdBTgYzXsbYB9fnxk
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MegaHackInstaller.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MegaHackInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MegaHackInstaller.exe -
resource yara_rule behavioral4/memory/2984-0-0x00000000002C0000-0x0000000000E64000-memory.dmp themida behavioral4/memory/2984-1-0x00000000002C0000-0x0000000000E64000-memory.dmp themida behavioral4/memory/2984-2-0x00000000002C0000-0x0000000000E64000-memory.dmp themida behavioral4/memory/2984-3-0x00000000002C0000-0x0000000000E64000-memory.dmp themida behavioral4/memory/2984-4-0x00000000002C0000-0x0000000000E64000-memory.dmp themida behavioral4/memory/2984-6-0x00000000002C0000-0x0000000000E64000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MegaHackInstaller.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2984 MegaHackInstaller.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2984 MegaHackInstaller.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2984 MegaHackInstaller.exe 2984 MegaHackInstaller.exe 2984 MegaHackInstaller.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MegaHackInstaller\MegaHackInstaller.exe"C:\Users\Admin\AppData\Local\Temp\MegaHackInstaller\MegaHackInstaller.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2984