Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-03-2024 22:24
Static task
static1
Behavioral task
behavioral1
Sample
c1c1b19835fa09dcc2ff5d80cdc3a422.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c1c1b19835fa09dcc2ff5d80cdc3a422.exe
Resource
win10v2004-20240226-en
General
-
Target
c1c1b19835fa09dcc2ff5d80cdc3a422.exe
-
Size
2.2MB
-
MD5
c1c1b19835fa09dcc2ff5d80cdc3a422
-
SHA1
c9f3d99f8835d4c685382101851615046db90b3d
-
SHA256
12ecc6148f29cbc2c73f35ff5b75081e9ddb30f6b3456f5eff726658eab7bbba
-
SHA512
996b00b99809d86561172f07031787c5ea031fdc4973c817b48600901d7d1a53eeebf0d1bea4f25d6cf7e021b54f2b8fcc502507feee21af2d9c156c6ab0fdcc
-
SSDEEP
49152:9DmN13o0VJvbp+vRRIyYBwHwbnZ2D9HaXl:9I5+vQzBEYn8da1
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c1c1b19835fa09dcc2ff5d80cdc3a422.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions c1c1b19835fa09dcc2ff5d80cdc3a422.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c1c1b19835fa09dcc2ff5d80cdc3a422.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c1c1b19835fa09dcc2ff5d80cdc3a422.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum c1c1b19835fa09dcc2ff5d80cdc3a422.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 c1c1b19835fa09dcc2ff5d80cdc3a422.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN c1c1b19835fa09dcc2ff5d80cdc3a422.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings c1c1b19835fa09dcc2ff5d80cdc3a422.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2240 c1c1b19835fa09dcc2ff5d80cdc3a422.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2240 c1c1b19835fa09dcc2ff5d80cdc3a422.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1c1b19835fa09dcc2ff5d80cdc3a422.exe"C:\Users\Admin\AppData\Local\Temp\c1c1b19835fa09dcc2ff5d80cdc3a422.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Maps connected drives based on registry
- Checks for VirtualBox DLLs, possible anti-VM trick
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2240