Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-03-2024 08:05
Behavioral task
behavioral1
Sample
61d3ef175c71ed873c13768d9824cef715a660f941571ad8003095ef84853491.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
61d3ef175c71ed873c13768d9824cef715a660f941571ad8003095ef84853491.exe
-
Size
10.0MB
-
MD5
1856ff537a972a7da0ed7cac99c07bcf
-
SHA1
8357b2be4cc489134aaca676ad62b40e0e84345a
-
SHA256
61d3ef175c71ed873c13768d9824cef715a660f941571ad8003095ef84853491
-
SHA512
4071b4f880d224dceae31f95a636190339f9d639c6deb44f4386eacc2e6e666d5fd6920c917014e4d33530c48b620ac30c6fe6ba5c482ab41b9957b3861cb237
-
SSDEEP
196608:+9aO2yKVyXC0/dShqsBAIgAT8BXA69LP1e1zDrdB4PH4omTo1A:+GyTCw+qsrvgBQY0sHW
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 61d3ef175c71ed873c13768d9824cef715a660f941571ad8003095ef84853491.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 61d3ef175c71ed873c13768d9824cef715a660f941571ad8003095ef84853491.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 61d3ef175c71ed873c13768d9824cef715a660f941571ad8003095ef84853491.exe -
resource yara_rule behavioral1/memory/1164-0-0x000000013F590000-0x00000001406D1000-memory.dmp themida behavioral1/memory/1164-1-0x000000013F590000-0x00000001406D1000-memory.dmp themida behavioral1/memory/1164-3-0x000000013F590000-0x00000001406D1000-memory.dmp themida behavioral1/memory/1164-4-0x000000013F590000-0x00000001406D1000-memory.dmp themida behavioral1/memory/1164-5-0x000000013F590000-0x00000001406D1000-memory.dmp themida behavioral1/memory/1164-6-0x000000013F590000-0x00000001406D1000-memory.dmp themida behavioral1/memory/1164-7-0x000000013F590000-0x00000001406D1000-memory.dmp themida behavioral1/memory/1164-9-0x000000013F590000-0x00000001406D1000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 61d3ef175c71ed873c13768d9824cef715a660f941571ad8003095ef84853491.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1164 61d3ef175c71ed873c13768d9824cef715a660f941571ad8003095ef84853491.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1164 61d3ef175c71ed873c13768d9824cef715a660f941571ad8003095ef84853491.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1164 61d3ef175c71ed873c13768d9824cef715a660f941571ad8003095ef84853491.exe 1164 61d3ef175c71ed873c13768d9824cef715a660f941571ad8003095ef84853491.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61d3ef175c71ed873c13768d9824cef715a660f941571ad8003095ef84853491.exe"C:\Users\Admin\AppData\Local\Temp\61d3ef175c71ed873c13768d9824cef715a660f941571ad8003095ef84853491.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1164