Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 06:42
Behavioral task
behavioral1
Sample
d5754a3b01e86b26d91fde1e4c682668.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
d5754a3b01e86b26d91fde1e4c682668.exe
-
Size
2.8MB
-
MD5
d5754a3b01e86b26d91fde1e4c682668
-
SHA1
8de1a20b5691c744832df9afca2189204aadf242
-
SHA256
bc34798a9c08f773d6ed20f8e590c4d8db11f56a8d7ac794eaf7c3a86cb3a339
-
SHA512
36172b57863980c22ecab6d4e8ad45b0e504e62d52f64431933322b8fa23194ec426a65004293fd7acf15153c680668ab4358dc8c205e0feaf2f7dc91f7bf7d4
-
SSDEEP
49152:88pUOcb8Fyv1/XBVMobENpnGDtkcdOYvKkaFlUYKg4x9zdO:fvST/XwobEN9qO6akY4vO
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d5754a3b01e86b26d91fde1e4c682668.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d5754a3b01e86b26d91fde1e4c682668.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d5754a3b01e86b26d91fde1e4c682668.exe -
resource yara_rule behavioral1/memory/2340-0-0x0000000000400000-0x0000000000BAA000-memory.dmp themida behavioral1/memory/2340-1-0x0000000000400000-0x0000000000BAA000-memory.dmp themida behavioral1/memory/2340-2-0x0000000000400000-0x0000000000BAA000-memory.dmp themida behavioral1/memory/2340-3-0x0000000000400000-0x0000000000BAA000-memory.dmp themida behavioral1/memory/2340-4-0x0000000000400000-0x0000000000BAA000-memory.dmp themida behavioral1/memory/2340-7-0x0000000000400000-0x0000000000BAA000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d5754a3b01e86b26d91fde1e4c682668.exe