Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 04:52
Behavioral task
behavioral1
Sample
070a26b9b519330da249104467525be63b1b23015d23c86b306d31465e79a024.exe
Resource
win7-20240221-en
6 signatures
150 seconds
General
-
Target
070a26b9b519330da249104467525be63b1b23015d23c86b306d31465e79a024.exe
-
Size
4.0MB
-
MD5
3d05f35dd57d171ef57a37fd9e8498fc
-
SHA1
c18418fe05ab38c0005ecbc0ed6ba10caca174c8
-
SHA256
070a26b9b519330da249104467525be63b1b23015d23c86b306d31465e79a024
-
SHA512
65dbc4c75dffcce863c351206cf43312c58cd1273f226c404df4da69cecabb407bfb277f4d1bbbab5952c730407a3d79f2d926b2aa77a6df7abc318c55868737
-
SSDEEP
98304:eEdeDPCpwDjPCTp9/ekFJkybBBHzmbLcwo8XGz:roPCSfaDmkFJk6BBypo8XGz
Malware Config
Signatures
-
Detects executables packed with Themida 2 IoCs
resource yara_rule behavioral1/memory/1640-0-0x000000013F7C0000-0x0000000140250000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/1640-2-0x000000013F7C0000-0x0000000140250000-memory.dmp INDICATOR_EXE_Packed_Themida -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 070a26b9b519330da249104467525be63b1b23015d23c86b306d31465e79a024.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 070a26b9b519330da249104467525be63b1b23015d23c86b306d31465e79a024.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 070a26b9b519330da249104467525be63b1b23015d23c86b306d31465e79a024.exe -
resource yara_rule behavioral1/memory/1640-0-0x000000013F7C0000-0x0000000140250000-memory.dmp themida behavioral1/memory/1640-2-0x000000013F7C0000-0x0000000140250000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 070a26b9b519330da249104467525be63b1b23015d23c86b306d31465e79a024.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1640 070a26b9b519330da249104467525be63b1b23015d23c86b306d31465e79a024.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\070a26b9b519330da249104467525be63b1b23015d23c86b306d31465e79a024.exe"C:\Users\Admin\AppData\Local\Temp\070a26b9b519330da249104467525be63b1b23015d23c86b306d31465e79a024.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1640