Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2024, 18:35
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
file.exe
-
Size
2.2MB
-
MD5
6795efba98699a0cae3c4f729b83ace9
-
SHA1
a46482db507cf67307880919b85dc2187d2a2512
-
SHA256
026387aa4411dac1107e403fb44fa90c5a34ec5ab0068af13e3f8f9f0b0f46cd
-
SHA512
12d49b08fec9dfc8efcddd9cfc7bdd3930ebc128f21667da11fc5ab1b80ba5f153608460275cf4f71695ed9b8b91bdf35261a099314b7ea10b39f000eda1a101
-
SSDEEP
49152:Pwr0j3Y/qI2SgJeK3pJ3uwkeUB+C+26jAaa7V03:PW0j3YSI2SgJeKj3tjUcC+26jAaMa
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe -
resource yara_rule behavioral2/memory/2408-0-0x0000000000B50000-0x00000000011DA000-memory.dmp themida behavioral2/memory/2408-1-0x0000000000B50000-0x00000000011DA000-memory.dmp themida behavioral2/memory/2408-2-0x0000000000B50000-0x00000000011DA000-memory.dmp themida behavioral2/memory/2408-3-0x0000000000B50000-0x00000000011DA000-memory.dmp themida behavioral2/memory/2408-4-0x0000000000B50000-0x00000000011DA000-memory.dmp themida behavioral2/memory/2408-5-0x0000000000B50000-0x00000000011DA000-memory.dmp themida behavioral2/memory/2408-6-0x0000000000B50000-0x00000000011DA000-memory.dmp themida behavioral2/memory/2408-7-0x0000000000B50000-0x00000000011DA000-memory.dmp themida behavioral2/memory/2408-8-0x0000000000B50000-0x00000000011DA000-memory.dmp themida behavioral2/memory/2408-9-0x0000000000B50000-0x00000000011DA000-memory.dmp themida behavioral2/memory/2408-10-0x0000000000B50000-0x00000000011DA000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file.exe