Analysis

  • max time kernel
    147s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-02-2024 01:18

General

  • Target

    MegaHackInstaller/MegaHackInstaller.exe

  • Size

    4.2MB

  • MD5

    df36e1cd968c7336fe4f29094e4099f9

  • SHA1

    2034e5f5d130dbf71c7e6ac82f8dbf808cfbd5c4

  • SHA256

    e840c1a894e7b96d401845f37f634204dccf23fb23f73e847131e8467cb62524

  • SHA512

    47778a6a1aa96ac8a2b5acb1208562df8b2e9e053d21cae9a8077b5d072d3661449c0e33444b4b19c4c1774a89663077df03668cef45108b5a92ae508fb02f37

  • SSDEEP

    98304:Qj2MjWxUAAWc0fnpTBTgY4EaIsSYK39B9Biih/nIGm9:Q6MEkWdBTgYzXsbYB9fnxk

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 6 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MegaHackInstaller\MegaHackInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\MegaHackInstaller\MegaHackInstaller.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2984-0-0x00000000002C0000-0x0000000000E64000-memory.dmp

    Filesize

    11.6MB

  • memory/2984-1-0x00000000002C0000-0x0000000000E64000-memory.dmp

    Filesize

    11.6MB

  • memory/2984-2-0x00000000002C0000-0x0000000000E64000-memory.dmp

    Filesize

    11.6MB

  • memory/2984-3-0x00000000002C0000-0x0000000000E64000-memory.dmp

    Filesize

    11.6MB

  • memory/2984-4-0x00000000002C0000-0x0000000000E64000-memory.dmp

    Filesize

    11.6MB

  • memory/2984-5-0x0000000002FF0000-0x0000000003000000-memory.dmp

    Filesize

    64KB

  • memory/2984-6-0x00000000002C0000-0x0000000000E64000-memory.dmp

    Filesize

    11.6MB