Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 08:27
Behavioral task
behavioral1
Sample
lasservices_spoofer.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
lasservices_spoofer.exe
-
Size
11.0MB
-
MD5
09bbb184c9a6e587b0f40492723e604f
-
SHA1
4bbcfa112b1cf36b138d463a7e6a99fbe94754eb
-
SHA256
6235dcfcc025b267404345ac9cbab036edd2e17b7f1c3009374042204d380b21
-
SHA512
906402ea905c08ce33690ce6d8b04e20ba50537ccd66e5422a27b1899960d2501ac693d5d06045bb68fd755f5c454ea8d319042f5383cc579e113c541e405317
-
SSDEEP
196608:JGluENPKd3fjqfnHzW2JmMf8PzHm1ufh6Bffpf5YUAyQ:Ml5RKJqPaMQa1ufh6BZyUAN
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ lasservices_spoofer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lasservices_spoofer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lasservices_spoofer.exe -
resource yara_rule behavioral1/memory/936-9-0x000000013FD80000-0x0000000141913000-memory.dmp themida behavioral1/memory/936-10-0x000000013FD80000-0x0000000141913000-memory.dmp themida behavioral1/memory/936-11-0x000000013FD80000-0x0000000141913000-memory.dmp themida behavioral1/memory/936-12-0x000000013FD80000-0x0000000141913000-memory.dmp themida behavioral1/memory/936-13-0x000000013FD80000-0x0000000141913000-memory.dmp themida behavioral1/memory/936-15-0x000000013FD80000-0x0000000141913000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lasservices_spoofer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 936 lasservices_spoofer.exe 936 lasservices_spoofer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 936 lasservices_spoofer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 936 wrote to memory of 2592 936 lasservices_spoofer.exe 29 PID 936 wrote to memory of 2592 936 lasservices_spoofer.exe 29 PID 936 wrote to memory of 2592 936 lasservices_spoofer.exe 29 PID 2592 wrote to memory of 2552 2592 cmd.exe 32 PID 2592 wrote to memory of 2552 2592 cmd.exe 32 PID 2592 wrote to memory of 2552 2592 cmd.exe 32 PID 2592 wrote to memory of 2504 2592 cmd.exe 31 PID 2592 wrote to memory of 2504 2592 cmd.exe 31 PID 2592 wrote to memory of 2504 2592 cmd.exe 31 PID 2592 wrote to memory of 2520 2592 cmd.exe 30 PID 2592 wrote to memory of 2520 2592 cmd.exe 30 PID 2592 wrote to memory of 2520 2592 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\lasservices_spoofer.exe"C:\Users\Admin\AppData\Local\Temp\lasservices_spoofer.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\lasservices_spoofer.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2520
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2504
-
-
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\lasservices_spoofer.exe" MD53⤵PID:2552
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2732