General
-
Target
7HMI9P6EOI.exe
-
Size
10.4MB
-
Sample
240222-2nm7vage72
-
MD5
7d55d62466eb034c8a5842075735388b
-
SHA1
6e3804162b62fca63f00237b90ced033c7bb4751
-
SHA256
938b6c2a1d72280742fde40e28b0dda21f14de8aab56181e502ac5a9ba625710
-
SHA512
2b0d4c4c7962d0ccd78f3606c39dc8ad04764a7a99e1eb8729f412be9c21f42f21e780eb9f33bcb5c3653e9dd27e001f5f917a7853558d67c53fc516de90e531
-
SSDEEP
196608:kp4QZqMFGkcNYuwPZ/bpo6kxYKURFqIhmdL1qo:kTtGt0zcmKURFq2m
Behavioral task
behavioral1
Sample
7HMI9P6EOI.exe
Resource
win10-20240221-en
Malware Config
Targets
-
-
Target
7HMI9P6EOI.exe
-
Size
10.4MB
-
MD5
7d55d62466eb034c8a5842075735388b
-
SHA1
6e3804162b62fca63f00237b90ced033c7bb4751
-
SHA256
938b6c2a1d72280742fde40e28b0dda21f14de8aab56181e502ac5a9ba625710
-
SHA512
2b0d4c4c7962d0ccd78f3606c39dc8ad04764a7a99e1eb8729f412be9c21f42f21e780eb9f33bcb5c3653e9dd27e001f5f917a7853558d67c53fc516de90e531
-
SSDEEP
196608:kp4QZqMFGkcNYuwPZ/bpo6kxYKURFqIhmdL1qo:kTtGt0zcmKURFq2m
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1