Overview
overview
9Static
static
7Loader/Per...er.bat
windows10-1703-x64
1Loader/Per...er.bat
windows10-2004-x64
1Loader/Render.exe
windows10-1703-x64
9Loader/Render.exe
windows10-2004-x64
9Loader/app..._2.exe
windows10-1703-x64
9Loader/app..._2.exe
windows10-2004-x64
9Loader/checker.exe
windows10-1703-x64
1Loader/checker.exe
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
09-03-2024 11:06
Behavioral task
behavioral1
Sample
Loader/Permament_Mac_Changer.bat
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
Loader/Permament_Mac_Changer.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Loader/Render.exe
Resource
win10-20240221-en
Behavioral task
behavioral4
Sample
Loader/Render.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Loader/applecleaner_2.exe
Resource
win10-20240221-en
Behavioral task
behavioral6
Sample
Loader/applecleaner_2.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Loader/checker.exe
Resource
win10-20240214-en
Behavioral task
behavioral8
Sample
Loader/checker.exe
Resource
win10v2004-20240226-en
General
-
Target
Loader/Render.exe
-
Size
7.9MB
-
MD5
6fb0f4100edb81e9db8581c4424be171
-
SHA1
12555aad36e75f3caedea6b2b834154a0a95c880
-
SHA256
55ef52db75cd48a2fcd03fff69e7e8a31ebf26d4ef170d0c9e68765624278116
-
SHA512
dafd9bdb3b0c031645e6f7e6f684a6d4baf4a4a62efb3ff2c4537699cee188d25b46f917a247dc1e42b337574e32ddb675ce33ff41a373b995ec362b1607fda3
-
SSDEEP
196608:Saz4mfp7n4GEiVuEwujjhg3i1UHJt5VrJmYTz/:SaE8n4+V6u3O39H73ggz
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Render.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Render.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Render.exe -
resource yara_rule behavioral3/memory/748-12-0x0000000000E60000-0x0000000001B60000-memory.dmp themida behavioral3/memory/748-13-0x0000000000E60000-0x0000000001B60000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Render.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 748 Render.exe 748 Render.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe 748 Render.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 748 Render.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader\Render.exe"C:\Users\Admin\AppData\Local\Temp\Loader\Render.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:748