Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/03/2024, 17:10
Behavioral task
behavioral1
Sample
d40fab4443e90a4f2fa843583c3f89a1.exe
Resource
win7-20240221-en
9 signatures
150 seconds
General
-
Target
d40fab4443e90a4f2fa843583c3f89a1.exe
-
Size
4.3MB
-
MD5
d40fab4443e90a4f2fa843583c3f89a1
-
SHA1
f504eaf7a3139a12a58ecaee011ae6f486ec6297
-
SHA256
ba2eb409f65dfd657cf72d02e0e385a4c7417598246ef7b8b8f3febce971cea9
-
SHA512
5d6f36dc4115cc4b43feba51e93f660d7a26cddd00f725bc9342fd3bc3fc0547e981d8348e830809e63f03688fdd655195fdcbaaabb7d2e357458321f9785377
-
SSDEEP
98304:XkhaGOiWEkYVcijHazK7Wv63x3ahmSxRYzFTu000eg:UhaGOPErrjH+KqI/SUzlb00e
Malware Config
Signatures
-
SectopRAT payload 3 IoCs
resource yara_rule behavioral1/memory/2296-19-0x0000000000940000-0x0000000001374000-memory.dmp family_sectoprat behavioral1/memory/2296-21-0x0000000000940000-0x0000000001374000-memory.dmp family_sectoprat behavioral1/memory/2296-40-0x0000000076780000-0x0000000076890000-memory.dmp family_sectoprat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d40fab4443e90a4f2fa843583c3f89a1.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d40fab4443e90a4f2fa843583c3f89a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d40fab4443e90a4f2fa843583c3f89a1.exe -
resource yara_rule behavioral1/memory/2296-19-0x0000000000940000-0x0000000001374000-memory.dmp themida behavioral1/memory/2296-21-0x0000000000940000-0x0000000001374000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d40fab4443e90a4f2fa843583c3f89a1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2296 d40fab4443e90a4f2fa843583c3f89a1.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2296 d40fab4443e90a4f2fa843583c3f89a1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2296 d40fab4443e90a4f2fa843583c3f89a1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d40fab4443e90a4f2fa843583c3f89a1.exe"C:\Users\Admin\AppData\Local\Temp\d40fab4443e90a4f2fa843583c3f89a1.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296