Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/04/2024, 16:25
Static task
static1
Behavioral task
behavioral1
Sample
68d06d36f2ba9741d30bad79cbb5044fc0e906736b9fdda42f4f83f2165fd535.exe
Resource
win10v2004-20240226-en
General
-
Target
68d06d36f2ba9741d30bad79cbb5044fc0e906736b9fdda42f4f83f2165fd535.exe
-
Size
2.2MB
-
MD5
f42787513371bf367cfec80f0bb82a53
-
SHA1
f16015367afb95fcb98740c7e54271730b97159e
-
SHA256
68d06d36f2ba9741d30bad79cbb5044fc0e906736b9fdda42f4f83f2165fd535
-
SHA512
ff9569600a54d81e38fb22c00d9057ef46e2940b92a19ab7e5cc5a0a0318731d84388b80212d53a1e46168d4c42885459228b49c3260f617284da9e55bc932d5
-
SSDEEP
49152:1s9NRR5MmyC8+CplTBBw1BYuqWC+YGHGPEuJ01pP0OV60h+8XLqaj/:1QNRG37dBieuqWmGHGPB0KK+8bqaj
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 68d06d36f2ba9741d30bad79cbb5044fc0e906736b9fdda42f4f83f2165fd535.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 68d06d36f2ba9741d30bad79cbb5044fc0e906736b9fdda42f4f83f2165fd535.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 68d06d36f2ba9741d30bad79cbb5044fc0e906736b9fdda42f4f83f2165fd535.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Wine 68d06d36f2ba9741d30bad79cbb5044fc0e906736b9fdda42f4f83f2165fd535.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1680 68d06d36f2ba9741d30bad79cbb5044fc0e906736b9fdda42f4f83f2165fd535.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1680 68d06d36f2ba9741d30bad79cbb5044fc0e906736b9fdda42f4f83f2165fd535.exe 1680 68d06d36f2ba9741d30bad79cbb5044fc0e906736b9fdda42f4f83f2165fd535.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68d06d36f2ba9741d30bad79cbb5044fc0e906736b9fdda42f4f83f2165fd535.exe"C:\Users\Admin\AppData\Local\Temp\68d06d36f2ba9741d30bad79cbb5044fc0e906736b9fdda42f4f83f2165fd535.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1680