Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
04053c70403aaab738bbd72667fb432a4b4bead0deb52112026d5ea9ee5dbadf.exe
Resource
win7-20240215-en
General
-
Target
04053c70403aaab738bbd72667fb432a4b4bead0deb52112026d5ea9ee5dbadf.exe
-
Size
6.9MB
-
MD5
88f7bfa6abb9b2dfbbbe1105698ac89f
-
SHA1
ab4cd6a3a4c1a89d70077f84f79d5937b31ebe16
-
SHA256
04053c70403aaab738bbd72667fb432a4b4bead0deb52112026d5ea9ee5dbadf
-
SHA512
1f8b64e0adbbca00ea019922be234239de1e5e884703e926074f82195c5aa5c9712fdae9ff9da445cbf2a3135a338dd0937b54703bbceae1ec0c7d878c1d1684
-
SSDEEP
196608:bGza7gQnetmUvUFvGs6HJV/h8SCJiZfKsPAiWuS:C27zemGpHXqSCJiZfnPX3
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 04053c70403aaab738bbd72667fb432a4b4bead0deb52112026d5ea9ee5dbadf.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 04053c70403aaab738bbd72667fb432a4b4bead0deb52112026d5ea9ee5dbadf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 04053c70403aaab738bbd72667fb432a4b4bead0deb52112026d5ea9ee5dbadf.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Wine 04053c70403aaab738bbd72667fb432a4b4bead0deb52112026d5ea9ee5dbadf.exe -
Unexpected DNS network traffic destination 9 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 103.27.108.197 Destination IP 103.27.108.197 Destination IP 103.27.108.197 Destination IP 103.27.108.197 Destination IP 103.27.108.197 Destination IP 103.27.108.197 Destination IP 103.27.108.197 Destination IP 103.27.108.197 Destination IP 103.27.108.197 -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 04053c70403aaab738bbd72667fb432a4b4bead0deb52112026d5ea9ee5dbadf.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2220 04053c70403aaab738bbd72667fb432a4b4bead0deb52112026d5ea9ee5dbadf.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2220 04053c70403aaab738bbd72667fb432a4b4bead0deb52112026d5ea9ee5dbadf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\04053c70403aaab738bbd72667fb432a4b4bead0deb52112026d5ea9ee5dbadf.exe"C:\Users\Admin\AppData\Local\Temp\04053c70403aaab738bbd72667fb432a4b4bead0deb52112026d5ea9ee5dbadf.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2220