Analysis
-
max time kernel
92s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 07:24
Behavioral task
behavioral1
Sample
GADAR.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
GADAR.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
GADAR.exe
Resource
win10v2004-20240508-en
General
-
Target
GADAR.exe
-
Size
47.9MB
-
MD5
2814e71ab1cdf00994521f2c95032c73
-
SHA1
3537800a401c0a8289209583639e542e180d603e
-
SHA256
af09f2db4951c00ccfb6780eea82915afd41d72698e9abadbb66fe9b7a27a7ca
-
SHA512
d07d453ec7d82f0f8e307cef180200d9e8bacad872d95dce06810962ef2b59e02057471899865a3a3eefc2e6d4ebce5ed2938636bb132e7c7401fa6f2fd65bf9
-
SSDEEP
786432:mjy7AtGx1lJZ4FT7tS4H1YfBIMcTJS6s0UYZua3vsEOBkTCYKiDYYGRRqy:ZAMx1lJ0tDHafBjcd2MsF8sYGr
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
GADAR.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GADAR.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
GADAR.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GADAR.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion GADAR.exe -
Loads dropped DLL 7 IoCs
Processes:
GADAR.exepid process 3208 GADAR.exe 3208 GADAR.exe 3208 GADAR.exe 3208 GADAR.exe 3208 GADAR.exe 3208 GADAR.exe 3208 GADAR.exe -
Obfuscated with Agile.Net obfuscator 4 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral3/memory/3208-0-0x0000000000C00000-0x00000000022EA000-memory.dmp agile_net behavioral3/memory/3208-4-0x0000000000C00000-0x000000000229C000-memory.dmp agile_net behavioral3/memory/3208-112-0x0000000000C00000-0x00000000022EA000-memory.dmp agile_net behavioral3/memory/3208-190-0x0000000000C00000-0x000000000229C000-memory.dmp agile_net -
Processes:
resource yara_rule behavioral3/memory/3208-9-0x0000000010000000-0x000000001149D000-memory.dmp themida behavioral3/memory/3208-20-0x0000000007530000-0x0000000007E65000-memory.dmp themida behavioral3/memory/3208-21-0x0000000010000000-0x000000001149D000-memory.dmp themida behavioral3/memory/3208-23-0x0000000010000000-0x000000001149D000-memory.dmp themida behavioral3/memory/3208-24-0x0000000010000000-0x000000001149D000-memory.dmp themida behavioral3/memory/3208-22-0x0000000010000000-0x000000001149D000-memory.dmp themida behavioral3/memory/3208-25-0x0000000010000000-0x000000001149D000-memory.dmp themida behavioral3/memory/3208-26-0x0000000010000000-0x000000001149D000-memory.dmp themida behavioral3/memory/3208-104-0x0000000010000000-0x000000001149D000-memory.dmp themida behavioral3/memory/3208-139-0x0000000010000000-0x000000001149D000-memory.dmp themida behavioral3/memory/3208-187-0x0000000010000000-0x000000001149D000-memory.dmp themida -
Processes:
GADAR.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GADAR.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
GADAR.exepid process 3208 GADAR.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3180 3208 WerFault.exe GADAR.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
GADAR.exepid process 3208 GADAR.exe 3208 GADAR.exe 3208 GADAR.exe 3208 GADAR.exe 3208 GADAR.exe 3208 GADAR.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
GADAR.exedescription pid process Token: SeDebugPrivilege 3208 GADAR.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\GADAR.exe"C:\Users\Admin\AppData\Local\Temp\GADAR.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 19842⤵
- Program crash
PID:3180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3208 -ip 32081⤵PID:2212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\SIKKA_V2.exe.configFilesize
534B
MD54b14782cb47160b63edb3a1374a75347
SHA10632cf59cf6ecf19847e241a81b8ae4ef4c41864
SHA256a5991e80a38e2aa164e09beb42cb87f70936f04dfa59370b0dbcf633eecda089
SHA512836a3f35ef5237bce387e1b595def60d07e1a0c7d1a4b0bed3e12c3eb6e4ac44c2a492409581f8c19334bb7a5dedbf885be4e2c2ff74987630892b96ebdccb5c
-
C:\Users\Admin\AppData\Local\Temp\config.zipFilesize
6.8MB
MD5acfc66bdc0874b0b5aa95aa4b704ee5a
SHA1780a2408b52ed2b9d24867440c8b9ee9fdf301cf
SHA256bba273900f9564a3af9dcedf90e43f5960a431f56927b68f5d0c29e833c64ed6
SHA5128836fe397e72030cadc9d78c7c7dc0b2ac5125b0b5abb12256f65c4f8b37a5cbaf29d149e3b00687ff278e2a091ccd034a6ffab3c3c1af44a0f3ec02d5428e45
-
C:\Users\Admin\AppData\Local\Temp\evb669A.tmpFilesize
1KB
MD5c40ae7a442636eea2c869669c8d819af
SHA1836c228f24f25133fd8a1242b12691c80aa0bef0
SHA256541ce6acba5c23906c51894f9550235eaf885f96a590fd7943b7dd68dfb73f68
SHA5128d5e5b0af1b926cb5c621800455518f3505bae3508d5583e41b1fe72c8ee32d6d5990ce82bb7f86ad5dc87f68d88894095e27d1cdcd5d92aea73e99b81b1b3ab
-
C:\Users\Admin\AppData\Local\Temp\evb8D5D.tmpFilesize
1KB
MD5aadec36a79a70c893d266252c60707b0
SHA1fe0e0eb278749fe39e80ed001afd4de42f41c8b5
SHA256e720344d50f5326d561fe16ac7ce2168ef808ec180e6f2fdfbdf4ada9af5d6bd
SHA51210a03b2650c3870409687527a26279c11c56b6fb99adb884e69ef025361f5e1440481e8d239c1bbbb44218c66b1eae67f5f4d241663fcee70d70c8d36e8f23b2
-
C:\Users\Admin\AppData\Local\Temp\evb9B1C.tmpFilesize
1KB
MD56ceb6e3be571bdaee3147adb325994f0
SHA125b8919e8c917c7d31436a4555d391306b96a3a3
SHA2563705ac3ba0589b10770f0fb31000372e8f0ccecd2397c96db3ad3c6b986fd002
SHA512339a1855a13fb844606e1950e430b5593528ec67da884d1b5a172a7740904daf1aaf6ae0cc0316638582742d1189720baba7f75030355ef706031074afd4d772
-
C:\Users\Admin\AppData\Local\Temp\x64\SQLite.Interop.dllFilesize
1.5MB
MD5a0d07d0e354c7760497ef7ea6227b937
SHA110cfc3ff37b8b492a2130d1cda2ccfa8788a9650
SHA256f39fc4d52b3e9e1a8d30fb8e2ffd320c1b54a5d5c5ad2444e57f0b3642cdc05e
SHA512908c234cb616edc87a76d9153a6da8f2a1013c477602ec2068dc598592cd1355569f42989b1f4b29ab43f9dde3912dbfd9bfb01eaedbf6960277d629f75e24eb
-
C:\Users\Admin\AppData\Local\Temp\x86\SQLite.Interop.dllFilesize
1.2MB
MD520f57cdc2bbf1921aeafc24a3550bafb
SHA1e20d2ad819b47f58ebeac880bd10c04f2c7c368c
SHA256b1d183195f39d03573312ca6b232869b2d06b2dd9afb8e7896f61eee3ee87224
SHA5129a2f663dfa528ce5dd27dfad3717f146fd7074de30916c675488f7b4e718bf0aa0b5007b937ff1fa32acdd7c7cb1b4166c5ef0744aa599370b01c33076429fd3
-
memory/3208-99-0x0000000008460000-0x00000000084FC000-memory.dmpFilesize
624KB
-
memory/3208-112-0x0000000000C00000-0x00000000022EA000-memory.dmpFilesize
22.9MB
-
memory/3208-17-0x00000000FFB50000-0x00000000FFD3F000-memory.dmpFilesize
1.9MB
-
memory/3208-18-0x0000000073FF0000-0x00000000747A0000-memory.dmpFilesize
7.7MB
-
memory/3208-20-0x0000000007530000-0x0000000007E65000-memory.dmpFilesize
9.2MB
-
memory/3208-21-0x0000000010000000-0x000000001149D000-memory.dmpFilesize
20.6MB
-
memory/3208-23-0x0000000010000000-0x000000001149D000-memory.dmpFilesize
20.6MB
-
memory/3208-24-0x0000000010000000-0x000000001149D000-memory.dmpFilesize
20.6MB
-
memory/3208-22-0x0000000010000000-0x000000001149D000-memory.dmpFilesize
20.6MB
-
memory/3208-25-0x0000000010000000-0x000000001149D000-memory.dmpFilesize
20.6MB
-
memory/3208-27-0x0000000072A00000-0x0000000072A89000-memory.dmpFilesize
548KB
-
memory/3208-26-0x0000000010000000-0x000000001149D000-memory.dmpFilesize
20.6MB
-
memory/3208-95-0x0000000008900000-0x0000000008EA4000-memory.dmpFilesize
5.6MB
-
memory/3208-96-0x0000000008350000-0x00000000083E2000-memory.dmpFilesize
584KB
-
memory/3208-97-0x0000000007630000-0x0000000007652000-memory.dmpFilesize
136KB
-
memory/3208-98-0x00000000083F0000-0x0000000008456000-memory.dmpFilesize
408KB
-
memory/3208-0-0x0000000000C00000-0x00000000022EA000-memory.dmpFilesize
22.9MB
-
memory/3208-13-0x0000000010000000-0x000000001149D000-memory.dmpFilesize
20.6MB
-
memory/3208-105-0x0000000008EB0000-0x000000000943E000-memory.dmpFilesize
5.6MB
-
memory/3208-111-0x0000000009440000-0x00000000099CE000-memory.dmpFilesize
5.6MB
-
memory/3208-104-0x0000000010000000-0x000000001149D000-memory.dmpFilesize
20.6MB
-
memory/3208-9-0x0000000010000000-0x000000001149D000-memory.dmpFilesize
20.6MB
-
memory/3208-113-0x0000000073FF0000-0x00000000747A0000-memory.dmpFilesize
7.7MB
-
memory/3208-114-0x0000000009440000-0x00000000099CE000-memory.dmpFilesize
5.6MB
-
memory/3208-115-0x0000000009440000-0x00000000099CE000-memory.dmpFilesize
5.6MB
-
memory/3208-116-0x0000000009D20000-0x0000000009D68000-memory.dmpFilesize
288KB
-
memory/3208-117-0x0000000009200000-0x0000000009208000-memory.dmpFilesize
32KB
-
memory/3208-118-0x0000000077172000-0x0000000077173000-memory.dmpFilesize
4KB
-
memory/3208-6-0x0000000073FF0000-0x00000000747A0000-memory.dmpFilesize
7.7MB
-
memory/3208-135-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/3208-129-0x0000000009D70000-0x0000000009DB4000-memory.dmpFilesize
272KB
-
memory/3208-128-0x0000000009D70000-0x0000000009DB4000-memory.dmpFilesize
272KB
-
memory/3208-126-0x0000000073FF0000-0x00000000747A0000-memory.dmpFilesize
7.7MB
-
memory/3208-139-0x0000000010000000-0x000000001149D000-memory.dmpFilesize
20.6MB
-
memory/3208-141-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/3208-140-0x0000000073FF0000-0x00000000747A0000-memory.dmpFilesize
7.7MB
-
memory/3208-142-0x0000000073FF0000-0x00000000747A0000-memory.dmpFilesize
7.7MB
-
memory/3208-1-0x0000000077172000-0x0000000077173000-memory.dmpFilesize
4KB
-
memory/3208-4-0x0000000000C00000-0x000000000229C000-memory.dmpFilesize
22.6MB
-
memory/3208-2-0x0000000077173000-0x0000000077174000-memory.dmpFilesize
4KB
-
memory/3208-3-0x0000000073FFE000-0x0000000073FFF000-memory.dmpFilesize
4KB
-
memory/3208-187-0x0000000010000000-0x000000001149D000-memory.dmpFilesize
20.6MB
-
memory/3208-190-0x0000000000C00000-0x000000000229C000-memory.dmpFilesize
22.6MB
-
memory/3208-191-0x0000000073FF0000-0x00000000747A0000-memory.dmpFilesize
7.7MB