Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 03:25
Static task
static1
Behavioral task
behavioral1
Sample
9fe5f5deb66b5752018c29526c756e0c.exe
Resource
win7-20240220-en
windows7-x64
45 signatures
150 seconds
General
-
Target
9fe5f5deb66b5752018c29526c756e0c.exe
-
Size
5.3MB
-
MD5
9fe5f5deb66b5752018c29526c756e0c
-
SHA1
e5741c4de55c6e5592b97eb6a2da62f2f18c2408
-
SHA256
42afece193b0655d0e769ca271d37d978c6265dc6404b679e3150d15225b2a60
-
SHA512
0588f193ba3348dd87b116d9786df6409941485c3749f38d58996e6df9a133ab59d25a1632516d97621930b456716d63af056fb7cce8f120ef5e67adc8229382
-
SSDEEP
98304:SZuzUFBlFMZ5T3a+gxH4Y5im48xaOxQc1zR0eWDu:SA+Zwxn4/5r4NaNcDu
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9fe5f5deb66b5752018c29526c756e0c.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9fe5f5deb66b5752018c29526c756e0c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9fe5f5deb66b5752018c29526c756e0c.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9fe5f5deb66b5752018c29526c756e0c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1520 9fe5f5deb66b5752018c29526c756e0c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1520 wrote to memory of 4996 1520 9fe5f5deb66b5752018c29526c756e0c.exe 88 PID 1520 wrote to memory of 4996 1520 9fe5f5deb66b5752018c29526c756e0c.exe 88 PID 1520 wrote to memory of 4996 1520 9fe5f5deb66b5752018c29526c756e0c.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fe5f5deb66b5752018c29526c756e0c.exe"C:\Users\Admin\AppData\Local\Temp\9fe5f5deb66b5752018c29526c756e0c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵PID:4996
-