Overview
overview
10Static
static
10Vast_2.zip
windows7-x64
1Vast_2.zip
windows10-2004-x64
1Vast.zip
windows7-x64
1Vast.zip
windows10-2004-x64
1Vast gen.zip
windows7-x64
1Vast gen.zip
windows10-2004-x64
1Vast gen/Loader.exe
windows7-x64
7Vast gen/Loader.exe
windows10-2004-x64
9O��`���.pyc
windows7-x64
O��`���.pyc
windows10-2004-x64
Vast gen/VastGen.exe
windows7-x64
7Vast gen/VastGen.exe
windows10-2004-x64
7main.pyc
windows7-x64
3main.pyc
windows10-2004-x64
3Vast gen/config.toml
windows7-x64
3Vast gen/config.toml
windows10-2004-x64
3Vast gen/crack.dll
windows7-x64
9Vast gen/crack.dll
windows10-2004-x64
9Vast gen/d...os.txt
windows7-x64
1Vast gen/d...os.txt
windows10-2004-x64
1Vast gen/d...es.txt
windows7-x64
1Vast gen/d...es.txt
windows10-2004-x64
1Vast gen/d...es.vbs
windows7-x64
1Vast gen/d...es.vbs
windows10-2004-x64
1Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 03:51
Behavioral task
behavioral1
Sample
Vast_2.zip
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Vast_2.zip
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
Vast.zip
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
Vast.zip
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
Vast gen.zip
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Vast gen.zip
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
Vast gen/Loader.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Vast gen/Loader.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
O��`���.pyc
Resource
win7-20240419-en
Behavioral task
behavioral10
Sample
O��`���.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Vast gen/VastGen.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Vast gen/VastGen.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
main.pyc
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
main.pyc
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
Vast gen/config.toml
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
Vast gen/config.toml
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
Vast gen/crack.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Vast gen/crack.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
Vast gen/data/bios.txt
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Vast gen/data/bios.txt
Resource
win10v2004-20240419-en
Behavioral task
behavioral21
Sample
Vast gen/data/proxies.txt
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
Vast gen/data/proxies.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
Vast gen/data/usernames.vbs
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Vast gen/data/usernames.vbs
Resource
win10v2004-20240419-en
General
-
Target
Vast gen/crack.dll
-
Size
4.9MB
-
MD5
69723359992ce5115d9b42638cc002e2
-
SHA1
72a48b2a1499a1588c9b9f3802cac8b2c672203f
-
SHA256
60c9cf09e8a9c2b2226b7088caea9ec876bfc9cdf890391bd05232114073dc9b
-
SHA512
598ca6dedf80c30eaea5a74b309f739b16a833bcaac00489b9d7bc97d4dc858023f2bcca60b3dc6374292c0bff1a082540bb9a3217da90381834cc8dfa664b91
-
SSDEEP
98304:+SyfeXYCYOJ0fn/XqE/1Y7UN3HGuHWGUKxEbem/4MBNDfdmjLdGGf:+SyKkx/e7D8WtbeY/LC
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2360 2908 rundll32.exe 28 PID 2908 wrote to memory of 2360 2908 rundll32.exe 28 PID 2908 wrote to memory of 2360 2908 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Vast gen\crack.dll",#11⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2908 -s 1042⤵PID:2360
-