Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 23:40
Behavioral task
behavioral1
Sample
iexplore.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
iexplore.exe
-
Size
10.7MB
-
MD5
8b5d0068d81159a93d0039020058bb36
-
SHA1
077e4acf9df950bf3c03867ab6756dbc2850641e
-
SHA256
d1edde93481fe9657a75ca47c6f4f28be372afb4374402d4c95eb06ce380a263
-
SHA512
18334137f1c2dba149ef479660e80c0bd1299db30867076d4fe1f0596d1d1182f1dc57884905c3fcc362f26a4a68baec3767761bf6d9cffce798941dc3e8521d
-
SSDEEP
196608:IPdgdrOIM+R7fZOa0x2CV4zSYPZmXebyzlvLrCreOSZ3OqVtHsrQ:IitOUR7fZOa0NsSYPqlCqOSJOgHsr
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ iexplore.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion iexplore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion iexplore.exe -
resource yara_rule behavioral1/memory/2676-1-0x000000013FEF0000-0x000000014157E000-memory.dmp themida behavioral1/memory/2676-2-0x000000013FEF0000-0x000000014157E000-memory.dmp themida behavioral1/memory/2676-3-0x000000013FEF0000-0x000000014157E000-memory.dmp themida behavioral1/memory/2676-4-0x000000013FEF0000-0x000000014157E000-memory.dmp themida behavioral1/memory/2676-5-0x000000013FEF0000-0x000000014157E000-memory.dmp themida behavioral1/memory/2676-6-0x000000013FEF0000-0x000000014157E000-memory.dmp themida behavioral1/memory/2676-7-0x000000013FEF0000-0x000000014157E000-memory.dmp themida behavioral1/memory/2676-8-0x000000013FEF0000-0x000000014157E000-memory.dmp themida behavioral1/memory/2676-9-0x000000013FEF0000-0x000000014157E000-memory.dmp themida behavioral1/memory/2676-10-0x000000013FEF0000-0x000000014157E000-memory.dmp themida behavioral1/memory/2676-11-0x000000013FEF0000-0x000000014157E000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2676 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2676 iexplore.exe Token: SeDebugPrivilege 2676 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2676 wrote to memory of 3008 2676 iexplore.exe 29 PID 2676 wrote to memory of 3008 2676 iexplore.exe 29 PID 2676 wrote to memory of 3008 2676 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\iexplore.exe"C:\Users\Admin\AppData\Local\Temp\iexplore.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2676 -s 3682⤵PID:3008
-