Analysis
-
max time kernel
141s -
max time network
93s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-04-2024 02:03
Static task
static1
Behavioral task
behavioral1
Sample
37cb404d7ab5f26ee23a2003834d3c265a962a3c8368929ac8defe8f9bf93c94.exe
Resource
win10v2004-20240419-en
General
-
Target
37cb404d7ab5f26ee23a2003834d3c265a962a3c8368929ac8defe8f9bf93c94.exe
-
Size
2.3MB
-
MD5
58297b31cefbe6652bb001b8889110e0
-
SHA1
84034b14410384032d159126c1c0e8c2212f6cf3
-
SHA256
37cb404d7ab5f26ee23a2003834d3c265a962a3c8368929ac8defe8f9bf93c94
-
SHA512
59ea98be0c66aba04d4e92901eb546e2814f31c9187d4845dda6a64495e06a92b5c4bb74a99fd71304e1915a6d8137b4baffcb4b8a19c208dd210e4a942c9e65
-
SSDEEP
49152:0g69SebPPiKgYyq3fLYYkOX4keD80qW/hTRhsGEgIXGyd4o:0g69Sebi83fLYYkt/80t/FohGy
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
37cb404d7ab5f26ee23a2003834d3c265a962a3c8368929ac8defe8f9bf93c94.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 37cb404d7ab5f26ee23a2003834d3c265a962a3c8368929ac8defe8f9bf93c94.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
37cb404d7ab5f26ee23a2003834d3c265a962a3c8368929ac8defe8f9bf93c94.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 37cb404d7ab5f26ee23a2003834d3c265a962a3c8368929ac8defe8f9bf93c94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 37cb404d7ab5f26ee23a2003834d3c265a962a3c8368929ac8defe8f9bf93c94.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
37cb404d7ab5f26ee23a2003834d3c265a962a3c8368929ac8defe8f9bf93c94.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3062789476-783164490-2318012559-1000\Software\Wine 37cb404d7ab5f26ee23a2003834d3c265a962a3c8368929ac8defe8f9bf93c94.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
37cb404d7ab5f26ee23a2003834d3c265a962a3c8368929ac8defe8f9bf93c94.exepid process 1044 37cb404d7ab5f26ee23a2003834d3c265a962a3c8368929ac8defe8f9bf93c94.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
37cb404d7ab5f26ee23a2003834d3c265a962a3c8368929ac8defe8f9bf93c94.exepid process 1044 37cb404d7ab5f26ee23a2003834d3c265a962a3c8368929ac8defe8f9bf93c94.exe 1044 37cb404d7ab5f26ee23a2003834d3c265a962a3c8368929ac8defe8f9bf93c94.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37cb404d7ab5f26ee23a2003834d3c265a962a3c8368929ac8defe8f9bf93c94.exe"C:\Users\Admin\AppData\Local\Temp\37cb404d7ab5f26ee23a2003834d3c265a962a3c8368929ac8defe8f9bf93c94.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1044