Analysis
-
max time kernel
133s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2024 18:41
Static task
static1
Behavioral task
behavioral1
Sample
MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe
Resource
win7-20240215-en
General
-
Target
MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe
-
Size
1.4MB
-
MD5
010d567d0d1d868448b16dfc46c59a43
-
SHA1
d6a4c3402298582a5ac1dedf4c2e14a0035730f3
-
SHA256
318822896d2f9f7c54e230ab1fbd77e4225bd5d1edc002c56316a0106eca652e
-
SHA512
2df55aaaae8ea60c2164993c1e5e48635f3ee8a6a129e2151bc594ff14b0cd5ff9778cc240438902a0055855007efe6458d9617d34a22389a406d41ef1b6a8e8
-
SSDEEP
24576:ruAojA8HR776sO8p0qonGox07Vv4AlTe+MOF8G4VZ:ruBdHRH6kp0qgIx7RklN
Malware Config
Extracted
bumblebee
asd1234
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Wine MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe 1988 MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe"C:\Users\Admin\AppData\Local\Temp\MYgiiW0vn3xU4jCrH7135CJb1dHtwALFYxagEG7KZS4.exe"1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks system information in the registry
- Checks for VirtualBox DLLs, possible anti-VM trick
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:1988