Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-04-2024 22:30
Static task
static1
Behavioral task
behavioral1
Sample
fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f.exe
Resource
win10v2004-20240419-en
General
-
Target
fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f.exe
-
Size
2.3MB
-
MD5
3d616a9857f08016be670ac2ec760830
-
SHA1
974963a3875e020954e0de6dea423b9441413636
-
SHA256
fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f
-
SHA512
81c44f17c8e6bfdfc48b56cfe528b083c9f2015451151c1015f0c640c8a5158f34b6a09356b0ff400608e882c27ab4e0b03b704f755d4da581640c5623a12de1
-
SSDEEP
49152:ug69SebPPiKgYyPsXPn8+5Aptz+5ZmKsEHmBmMQem4KmVz9zyut:ug69SebiMn8OOx+bmOHmmuJRNNt
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-891789021-684472942-1795878712-1000\Software\Wine fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f.exepid process 4388 fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f.exepid process 4388 fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f.exe 4388 fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f.exe"C:\Users\Admin\AppData\Local\Temp\fd3486dc53a822a6dcc47579d92b5966a168151f2fc66636f4640915f83d015f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4388-0-0x0000000000BD0000-0x00000000011A1000-memory.dmpFilesize
5.8MB
-
memory/4388-1-0x0000000077BC6000-0x0000000077BC8000-memory.dmpFilesize
8KB
-
memory/4388-2-0x0000000005000000-0x0000000005001000-memory.dmpFilesize
4KB
-
memory/4388-12-0x0000000004FA0000-0x0000000004FA1000-memory.dmpFilesize
4KB
-
memory/4388-11-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/4388-10-0x0000000004FF0000-0x0000000004FF1000-memory.dmpFilesize
4KB
-
memory/4388-9-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB
-
memory/4388-8-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/4388-4-0x0000000004FC0000-0x0000000004FC1000-memory.dmpFilesize
4KB
-
memory/4388-7-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/4388-6-0x0000000004FB0000-0x0000000004FB1000-memory.dmpFilesize
4KB
-
memory/4388-5-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/4388-3-0x0000000004FD0000-0x0000000004FD1000-memory.dmpFilesize
4KB
-
memory/4388-13-0x0000000005080000-0x0000000005082000-memory.dmpFilesize
8KB
-
memory/4388-14-0x0000000000BD0000-0x00000000011A1000-memory.dmpFilesize
5.8MB
-
memory/4388-15-0x0000000000BD0000-0x00000000011A1000-memory.dmpFilesize
5.8MB
-
memory/4388-16-0x0000000000BD0000-0x00000000011A1000-memory.dmpFilesize
5.8MB
-
memory/4388-17-0x0000000000BD0000-0x00000000011A1000-memory.dmpFilesize
5.8MB
-
memory/4388-18-0x0000000000BD0000-0x00000000011A1000-memory.dmpFilesize
5.8MB
-
memory/4388-19-0x0000000000BD0000-0x00000000011A1000-memory.dmpFilesize
5.8MB
-
memory/4388-20-0x0000000000BD0000-0x00000000011A1000-memory.dmpFilesize
5.8MB
-
memory/4388-21-0x0000000000BD0000-0x00000000011A1000-memory.dmpFilesize
5.8MB
-
memory/4388-22-0x0000000000BD0000-0x00000000011A1000-memory.dmpFilesize
5.8MB
-
memory/4388-23-0x0000000000BD0000-0x00000000011A1000-memory.dmpFilesize
5.8MB
-
memory/4388-24-0x0000000000BD0000-0x00000000011A1000-memory.dmpFilesize
5.8MB
-
memory/4388-25-0x0000000000BD0000-0x00000000011A1000-memory.dmpFilesize
5.8MB
-
memory/4388-26-0x0000000000BD0000-0x00000000011A1000-memory.dmpFilesize
5.8MB
-
memory/4388-27-0x0000000000BD0000-0x00000000011A1000-memory.dmpFilesize
5.8MB
-
memory/4388-28-0x0000000000BD0000-0x00000000011A1000-memory.dmpFilesize
5.8MB