Analysis

  • max time kernel
    142s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2024 06:51

General

  • Target

    2134cc3b87763f85fdcf1024afe46d86dd229857c0b03e17b02042dd4b7a3ea9.exe

  • Size

    5.3MB

  • MD5

    11380a723c10152e806742510f6aa79c

  • SHA1

    0a7ed414ae9a6442ab4830a6d35a531e408eb530

  • SHA256

    2134cc3b87763f85fdcf1024afe46d86dd229857c0b03e17b02042dd4b7a3ea9

  • SHA512

    2196909b5922a2e319287aea910d15d74d923537bf54ea6cab102674b68a932d781c9cd2f6f051a8995f4ef9df0c098e9cff1c9e6a2a8c4271aa48efe6df4501

  • SSDEEP

    98304:bLrhcHp5ooEAnHRVN07KgHDpS18DqBRe7qxKfT1J+tNY3LU4rI2qo:vVg53HRVu7vHDpS1IqBRU7kCs2q

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Detect suspicious telegram bot 1 IoCs

    Detect suspicious telegram bot.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2134cc3b87763f85fdcf1024afe46d86dd229857c0b03e17b02042dd4b7a3ea9.exe
    "C:\Users\Admin\AppData\Local\Temp\2134cc3b87763f85fdcf1024afe46d86dd229857c0b03e17b02042dd4b7a3ea9.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:3372
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3768 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4716

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Defense Evasion

    Virtualization/Sandbox Evasion

    1
    T1497

    Discovery

    Query Registry

    2
    T1012

    Virtualization/Sandbox Evasion

    1
    T1497

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\f916c0ea-bad6-4b8b-a2be-b2ece7973f28\AgileDotNetRT64.dll
      Filesize

      3.0MB

      MD5

      e3bd88b3c3e9b33dfa72c814f8826cff

      SHA1

      6d220c9eb7ee695f2b9dec261941bed59cac15e4

      SHA256

      28e9458a43e5d86a341590eaa83d0da18c29fce81f2383d84bda484e049a1796

      SHA512

      fcb7e384b5bda0f810c4b6190a991bd066eedfc8fc97af9837cda1ba480385c8bc09bd703c1029f9d8d8a3eea3dbc03af97b014b4713a4ceea6ad6ae85b3b6e9

    • memory/3372-0-0x00007FF984463000-0x00007FF984465000-memory.dmp
      Filesize

      8KB

    • memory/3372-1-0x0000000000030000-0x000000000058C000-memory.dmp
      Filesize

      5.4MB

    • memory/3372-8-0x00007FF984460000-0x00007FF984F21000-memory.dmp
      Filesize

      10.8MB

    • memory/3372-9-0x00007FF981770000-0x00007FF981FCF000-memory.dmp
      Filesize

      8.4MB

    • memory/3372-10-0x00007FF981770000-0x00007FF981FCF000-memory.dmp
      Filesize

      8.4MB

    • memory/3372-11-0x00007FF984460000-0x00007FF984F21000-memory.dmp
      Filesize

      10.8MB

    • memory/3372-12-0x00007FF982C50000-0x00007FF982D9E000-memory.dmp
      Filesize

      1.3MB

    • memory/3372-13-0x00007FF981770000-0x00007FF981FCF000-memory.dmp
      Filesize

      8.4MB

    • memory/3372-14-0x00007FF984460000-0x00007FF984F21000-memory.dmp
      Filesize

      10.8MB