Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 01:26
Behavioral task
behavioral1
Sample
1205c112ad35995a65e8131892a89150911994d5a95dbfa114e34857e79a5045.exe
Resource
win7-20240419-en
windows7-x64
6 signatures
150 seconds
General
-
Target
1205c112ad35995a65e8131892a89150911994d5a95dbfa114e34857e79a5045.exe
-
Size
2.2MB
-
MD5
b2f24660f0c75e0d3a8b553856a348fa
-
SHA1
be5c9c069bb87ec763fe2f057a0e409c987c0e4a
-
SHA256
1205c112ad35995a65e8131892a89150911994d5a95dbfa114e34857e79a5045
-
SHA512
47cd041542d352fc290c455313225b400cc9cf550b4100513ae94e0b4002add84c0dd6e2151cdc49e86acc298f818d397e3f97f330eb405298253017ee87cdab
-
SSDEEP
49152:MuAbMFmAwbrWM70aYrlc4tf9xoU5t3ghZtkPL26cP0cLsE:UbmmFHWM7vqW4tlxV59yZiD4vwE
Malware Config
Signatures
-
Detects executables packed with Themida 10 IoCs
resource yara_rule behavioral1/memory/1736-0-0x0000000000F50000-0x00000000015E0000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/1736-1-0x0000000000F50000-0x00000000015E0000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/1736-3-0x0000000000F50000-0x00000000015E0000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/1736-4-0x0000000000F50000-0x00000000015E0000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/1736-2-0x0000000000F50000-0x00000000015E0000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/1736-7-0x0000000000F50000-0x00000000015E0000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/1736-8-0x0000000000F50000-0x00000000015E0000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/1736-6-0x0000000000F50000-0x00000000015E0000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/1736-5-0x0000000000F50000-0x00000000015E0000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/1736-9-0x0000000000F50000-0x00000000015E0000-memory.dmp INDICATOR_EXE_Packed_Themida -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1205c112ad35995a65e8131892a89150911994d5a95dbfa114e34857e79a5045.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1205c112ad35995a65e8131892a89150911994d5a95dbfa114e34857e79a5045.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1205c112ad35995a65e8131892a89150911994d5a95dbfa114e34857e79a5045.exe -
resource yara_rule behavioral1/memory/1736-0-0x0000000000F50000-0x00000000015E0000-memory.dmp themida behavioral1/memory/1736-1-0x0000000000F50000-0x00000000015E0000-memory.dmp themida behavioral1/memory/1736-3-0x0000000000F50000-0x00000000015E0000-memory.dmp themida behavioral1/memory/1736-4-0x0000000000F50000-0x00000000015E0000-memory.dmp themida behavioral1/memory/1736-2-0x0000000000F50000-0x00000000015E0000-memory.dmp themida behavioral1/memory/1736-7-0x0000000000F50000-0x00000000015E0000-memory.dmp themida behavioral1/memory/1736-8-0x0000000000F50000-0x00000000015E0000-memory.dmp themida behavioral1/memory/1736-6-0x0000000000F50000-0x00000000015E0000-memory.dmp themida behavioral1/memory/1736-5-0x0000000000F50000-0x00000000015E0000-memory.dmp themida behavioral1/memory/1736-9-0x0000000000F50000-0x00000000015E0000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1205c112ad35995a65e8131892a89150911994d5a95dbfa114e34857e79a5045.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1205c112ad35995a65e8131892a89150911994d5a95dbfa114e34857e79a5045.exe"C:\Users\Admin\AppData\Local\Temp\1205c112ad35995a65e8131892a89150911994d5a95dbfa114e34857e79a5045.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:1736