Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
07-03-2024 18:53
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240215-en
windows7-x64
7 signatures
150 seconds
General
-
Target
file.exe
-
Size
2.6MB
-
MD5
25878d05da17b12a6a881c9eee286ecf
-
SHA1
718bd9780867fc65ae9a5edb72dfa521032857f9
-
SHA256
92375481f3bbd1087b7052a928c1dfd054a912787fd68c4871a87bf5e5c7a06c
-
SHA512
5552df151c435381851fb165611236490720028555e4ddb7f97ae53c221a0540cf0b94679e5e522604b897bf4dea27345be992820b7add432d20d9532dae9124
-
SSDEEP
49152:7hw1/O9xNvzr8Y+F3ByAMlcqOAeCMYVpnCcU563uiSiwK:NwExNvv8Y+pBVMiqOAeCvVpCcUs3BLwK
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe -
resource yara_rule behavioral1/memory/2356-0-0x0000000000990000-0x000000000101C000-memory.dmp themida behavioral1/memory/2356-2-0x0000000000990000-0x000000000101C000-memory.dmp themida behavioral1/memory/2356-3-0x0000000000990000-0x000000000101C000-memory.dmp themida behavioral1/memory/2356-4-0x0000000000990000-0x000000000101C000-memory.dmp themida behavioral1/memory/2356-5-0x0000000000990000-0x000000000101C000-memory.dmp themida behavioral1/memory/2356-6-0x0000000000990000-0x000000000101C000-memory.dmp themida behavioral1/memory/2356-7-0x0000000000990000-0x000000000101C000-memory.dmp themida behavioral1/memory/2356-9-0x0000000000990000-0x000000000101C000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2356 file.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2492 2356 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2492 2356 file.exe 28 PID 2356 wrote to memory of 2492 2356 file.exe 28 PID 2356 wrote to memory of 2492 2356 file.exe 28 PID 2356 wrote to memory of 2492 2356 file.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 1642⤵
- Program crash
PID:2492
-