Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 11:00
Behavioral task
behavioral1
Sample
Predstavlenie № 6-51-2024 .docx.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Predstavlenie № 6-51-2024 .docx.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$TEMP/rupedoras.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$TEMP/rupedoras.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$TEMP/zapros.docx
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$TEMP/zapros.docx
Resource
win10v2004-20240508-en
General
-
Target
$TEMP/rupedoras.exe
-
Size
11.2MB
-
MD5
d483c1a9718cf5d880b3cce5d6ff7423
-
SHA1
72be5e949dd6923a43e7eaab1811baea4bc4b644
-
SHA256
8df595a1528a09fdcfe237a7dd1009d1380a886875747d1b145925968463f7bd
-
SHA512
370e220b3bdb617a12479db075ee26741075306ce7a72237115b2d79c452baadf931ccf3b422e9d0ef1eb0138316c3233f3ecd27074f3e797dc20ee974eb6fe4
-
SSDEEP
196608:BtCbFLyXyLm+2WzU4qrVTcHHRBTue9iSoCVMbgb/x3/18af:mxL4S2kCVsHRsekTCVxhj
Malware Config
Signatures
-
DarkTrack payload 4 IoCs
resource yara_rule behavioral3/memory/2716-47-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral3/memory/2716-48-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral3/memory/2716-49-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral3/memory/2716-50-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rupedoras.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rupedoras.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rupedoras.exe -
resource yara_rule behavioral3/memory/2932-53-0x0000000000400000-0x0000000001F60000-memory.dmp themida -
resource yara_rule behavioral3/memory/2716-24-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral3/memory/2716-26-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral3/memory/2716-45-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral3/memory/2716-46-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral3/memory/2716-47-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral3/memory/2716-48-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral3/memory/2716-49-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral3/memory/2716-50-0x0000000000400000-0x00000000004A8000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rupedoras.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2932 rupedoras.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2932 set thread context of 2716 2932 rupedoras.exe 28 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2932 rupedoras.exe 2932 rupedoras.exe 2932 rupedoras.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2716 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2932 rupedoras.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2716 2932 rupedoras.exe 28 PID 2932 wrote to memory of 2716 2932 rupedoras.exe 28 PID 2932 wrote to memory of 2716 2932 rupedoras.exe 28 PID 2932 wrote to memory of 2716 2932 rupedoras.exe 28 PID 2932 wrote to memory of 2716 2932 rupedoras.exe 28 PID 2932 wrote to memory of 2716 2932 rupedoras.exe 28 PID 2932 wrote to memory of 2716 2932 rupedoras.exe 28 PID 2932 wrote to memory of 2716 2932 rupedoras.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\rupedoras.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\rupedoras.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:2716
-