Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
15-05-2024 10:01
Behavioral task
behavioral1
Sample
Predstavlenie № 6-51-2024 .docx.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
$TEMP/rupedoras.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
$TEMP/zapros.docx
Resource
win10-20240404-en
General
-
Target
$TEMP/rupedoras.exe
-
Size
11.2MB
-
MD5
d483c1a9718cf5d880b3cce5d6ff7423
-
SHA1
72be5e949dd6923a43e7eaab1811baea4bc4b644
-
SHA256
8df595a1528a09fdcfe237a7dd1009d1380a886875747d1b145925968463f7bd
-
SHA512
370e220b3bdb617a12479db075ee26741075306ce7a72237115b2d79c452baadf931ccf3b422e9d0ef1eb0138316c3233f3ecd27074f3e797dc20ee974eb6fe4
-
SSDEEP
196608:BtCbFLyXyLm+2WzU4qrVTcHHRBTue9iSoCVMbgb/x3/18af:mxL4S2kCVsHRsekTCVxhj
Malware Config
Signatures
-
DarkTrack payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/660-32-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral2/memory/660-35-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral2/memory/660-34-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral2/memory/660-36-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
rupedoras.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rupedoras.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rupedoras.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rupedoras.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rupedoras.exe -
Processes:
resource yara_rule behavioral2/memory/2268-11-0x0000000000400000-0x0000000001F60000-memory.dmp themida behavioral2/memory/2268-12-0x0000000000400000-0x0000000001F60000-memory.dmp themida behavioral2/memory/2268-39-0x0000000000400000-0x0000000001F60000-memory.dmp themida -
Processes:
resource yara_rule behavioral2/memory/660-28-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral2/memory/660-30-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral2/memory/660-32-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral2/memory/660-31-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral2/memory/660-35-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral2/memory/660-34-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral2/memory/660-36-0x0000000000400000-0x00000000004A8000-memory.dmp upx -
Processes:
rupedoras.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rupedoras.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
rupedoras.exepid process 2268 rupedoras.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rupedoras.exedescription pid process target process PID 2268 set thread context of 660 2268 rupedoras.exe AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rupedoras.exepid process 2268 rupedoras.exe 2268 rupedoras.exe 2268 rupedoras.exe 2268 rupedoras.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AddInProcess32.exepid process 660 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
rupedoras.exedescription pid process Token: SeDebugPrivilege 2268 rupedoras.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rupedoras.exedescription pid process target process PID 2268 wrote to memory of 660 2268 rupedoras.exe AddInProcess32.exe PID 2268 wrote to memory of 660 2268 rupedoras.exe AddInProcess32.exe PID 2268 wrote to memory of 660 2268 rupedoras.exe AddInProcess32.exe PID 2268 wrote to memory of 660 2268 rupedoras.exe AddInProcess32.exe PID 2268 wrote to memory of 660 2268 rupedoras.exe AddInProcess32.exe PID 2268 wrote to memory of 660 2268 rupedoras.exe AddInProcess32.exe PID 2268 wrote to memory of 660 2268 rupedoras.exe AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\rupedoras.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\rupedoras.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:660
-