Analysis
-
max time kernel
17s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 04:02
General
-
Target
temp_3h9orv125e06a2gb5rcc.bin.exe
-
Size
2.9MB
-
MD5
0b08be3e06beeec5248b2a198a7be6e2
-
SHA1
622631484bbec32245d27e44df1f09012746516c
-
SHA256
2ecaaef52fe4a50504df6e3ccc868a0d795a9d978d43619db61d2602b2048bc5
-
SHA512
54930201d9fff2017addf9b0b44765055e4883812712a4d89a8939a426265c9dc101fd2932174289a4a88effea8800c5f621434e30274bea4e3ad60c0eeea8f5
-
SSDEEP
49152:4yp5WwqNmJRcmpfdRYzqARs7SDREHdk7fT9i7G2mrFIzmndtMNLoFxVOxh:4MWwc6zfdRYzqA67SuHeL98GvrFIzEa/
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ temp_3h9orv125e06a2gb5rcc.bin.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion temp_3h9orv125e06a2gb5rcc.bin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion temp_3h9orv125e06a2gb5rcc.bin.exe -
resource yara_rule behavioral1/memory/1932-0-0x00007FF7433B0000-0x00007FF743BAC000-memory.dmp themida behavioral1/memory/1932-3-0x00007FF7433B0000-0x00007FF743BAC000-memory.dmp themida behavioral1/memory/1932-4-0x00007FF7433B0000-0x00007FF743BAC000-memory.dmp themida behavioral1/memory/1932-2-0x00007FF7433B0000-0x00007FF743BAC000-memory.dmp themida behavioral1/memory/1932-5-0x00007FF7433B0000-0x00007FF743BAC000-memory.dmp themida behavioral1/memory/1932-6-0x00007FF7433B0000-0x00007FF743BAC000-memory.dmp themida behavioral1/memory/1932-8-0x00007FF7433B0000-0x00007FF743BAC000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA temp_3h9orv125e06a2gb5rcc.bin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1932 temp_3h9orv125e06a2gb5rcc.bin.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1464 1932 temp_3h9orv125e06a2gb5rcc.bin.exe 89 PID 1932 wrote to memory of 1464 1932 temp_3h9orv125e06a2gb5rcc.bin.exe 89 PID 1932 wrote to memory of 1968 1932 temp_3h9orv125e06a2gb5rcc.bin.exe 92 PID 1932 wrote to memory of 1968 1932 temp_3h9orv125e06a2gb5rcc.bin.exe 92 PID 1968 wrote to memory of 3672 1968 cmd.exe 93 PID 1968 wrote to memory of 3672 1968 cmd.exe 93 PID 1968 wrote to memory of 4496 1968 cmd.exe 94 PID 1968 wrote to memory of 4496 1968 cmd.exe 94 PID 1968 wrote to memory of 4176 1968 cmd.exe 95 PID 1968 wrote to memory of 4176 1968 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\temp_3h9orv125e06a2gb5rcc.bin.exe"C:\Users\Admin\AppData\Local\Temp\temp_3h9orv125e06a2gb5rcc.bin.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\temp_3h9orv125e06a2gb5rcc.bin.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\temp_3h9orv125e06a2gb5rcc.bin.exe" MD53⤵PID:3672
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:4496
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:4176
-
-