Analysis
-
max time kernel
451s -
max time network
449s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 14:36
General
-
Target
Render.exe
-
Size
7.9MB
-
MD5
6fb0f4100edb81e9db8581c4424be171
-
SHA1
12555aad36e75f3caedea6b2b834154a0a95c880
-
SHA256
55ef52db75cd48a2fcd03fff69e7e8a31ebf26d4ef170d0c9e68765624278116
-
SHA512
dafd9bdb3b0c031645e6f7e6f684a6d4baf4a4a62efb3ff2c4537699cee188d25b46f917a247dc1e42b337574e32ddb675ce33ff41a373b995ec362b1607fda3
-
SSDEEP
196608:Saz4mfp7n4GEiVuEwujjhg3i1UHJt5VrJmYTz/:SaE8n4+V6u3O39H73ggz
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Render.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Render.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Render.exe -
resource yara_rule behavioral1/memory/3704-11-0x0000000000E90000-0x0000000001B90000-memory.dmp themida behavioral1/memory/3704-12-0x0000000000E90000-0x0000000001B90000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Render.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3704 Render.exe 3704 Render.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe 3704 Render.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3704 Render.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Render.exe"C:\Users\Admin\AppData\Local\Temp\Render.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3704