Analysis
-
max time kernel
1792s -
max time network
1571s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 18:08
Behavioral task
behavioral1
Sample
StatesFenceStatutesTennessee.exe
Resource
win7-20240221-en
General
-
Target
StatesFenceStatutesTennessee.exe
-
Size
327.7MB
-
MD5
7e25fdb1932480e3e6ec31b22d08c19e
-
SHA1
0dfca2e6c1c89b1e85fdbb9da31a93964db7b826
-
SHA256
fbef401c6a7ad24640f6b6583aa0d0fa02aa895c47ab08e68b0e6e312d1b42a5
-
SHA512
2bb81a8ddda7ef4bbc9508c7c80f56b5a00215674ad38e442937c42a2ecdf4e827b906b97bf63c67c36dd0a7ef78d2c6b5b6202d96516ece8b5d2dbd355f8326
-
SSDEEP
196608:99GeDVI5DKBWZlkgJedYs6LtYdEhqTgKDf:9kYVI5DK2NNs6LtYdEhSpz
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ StatesFenceStatutesTennessee.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion StatesFenceStatutesTennessee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion StatesFenceStatutesTennessee.exe -
Loads dropped DLL 1 IoCs
pid Process 2968 StatesFenceStatutesTennessee.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/2968-1-0x0000000000DA0000-0x0000000001DA0000-memory.dmp agile_net -
resource yara_rule behavioral1/files/0x000b000000015c7d-6.dat themida behavioral1/files/0x000b000000015c7d-8.dat themida behavioral1/memory/2968-9-0x000007FEF2180000-0x000007FEF2932000-memory.dmp themida behavioral1/memory/2968-11-0x000007FEF2180000-0x000007FEF2932000-memory.dmp themida behavioral1/memory/2968-22-0x000007FEF2180000-0x000007FEF2932000-memory.dmp themida behavioral1/memory/2968-59-0x000007FEF2180000-0x000007FEF2932000-memory.dmp themida behavioral1/memory/2968-77-0x000007FEF2180000-0x000007FEF2932000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA StatesFenceStatutesTennessee.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2708 2968 StatesFenceStatutesTennessee.exe 28 PID 2968 wrote to memory of 2708 2968 StatesFenceStatutesTennessee.exe 28 PID 2968 wrote to memory of 2708 2968 StatesFenceStatutesTennessee.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\StatesFenceStatutesTennessee.exe"C:\Users\Admin\AppData\Local\Temp\StatesFenceStatutesTennessee.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2968 -s 10762⤵PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5af6b8b4376a40643533026473822a25a
SHA1dc82783f34464a504d77a1f3a59afe143b272772
SHA256bc1f54fbe344659e04378d425dda35a9835244b645509cd92463a63945fbc8bd
SHA5124169acd59bbfde2209a0a61667c5bc66588cdd6f3c93ff148e10133466ce37be2acdb31b15fc4c8da7a0ceb5caf966378b5007f3cfb7a176cb9ec6ad45f537a9
-
Filesize
1.1MB
MD54713406c75fc2ddd3a04f83ef3215bdc
SHA1aa4771c74a023f57ebf0c3cda7cdfac7872b5d0f
SHA256cca1114cd4949885b279747bd673854aee450d23858fff9d198527176d91b0f9
SHA512866a8424f65c5d75214b2b0e65e43a632c3f02b699dfb959683b5e76367d50edf342c7cbcdcb682565f710617795a04e135c36ccc4286cbedfc46d5a870da4bd