Analysis
-
max time kernel
140s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 00:42
Static task
static1
Behavioral task
behavioral1
Sample
81e8aa34984a29b9f5e1e017fcdc76c06a8da2c26edbe4e45ad4a088aac5b327.exe
Resource
win7-20240221-en
General
-
Target
81e8aa34984a29b9f5e1e017fcdc76c06a8da2c26edbe4e45ad4a088aac5b327.exe
-
Size
4.1MB
-
MD5
6188d5ecaa97c6835ae4d613b354c796
-
SHA1
38292568f78035f6514eb4ec32fcf71226904393
-
SHA256
81e8aa34984a29b9f5e1e017fcdc76c06a8da2c26edbe4e45ad4a088aac5b327
-
SHA512
fae071f40248873d4170054f5028e854ea67b8cc7e310fbd4102a347ba7fa38b9b59c79c780d5d2db65abbf1518f60c5ef056972488bfe92f6b89cb4fa57f897
-
SSDEEP
98304:KEc1bNmfyMj4ryXdLdiXx+Rton9QTj53C8f93S8b+m9axAm:KhNmaMj4rOwxwton0jNeGmA
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 81e8aa34984a29b9f5e1e017fcdc76c06a8da2c26edbe4e45ad4a088aac5b327.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 81e8aa34984a29b9f5e1e017fcdc76c06a8da2c26edbe4e45ad4a088aac5b327.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 81e8aa34984a29b9f5e1e017fcdc76c06a8da2c26edbe4e45ad4a088aac5b327.exe -
Loads dropped DLL 2 IoCs
pid Process 3396 81e8aa34984a29b9f5e1e017fcdc76c06a8da2c26edbe4e45ad4a088aac5b327.exe 3396 81e8aa34984a29b9f5e1e017fcdc76c06a8da2c26edbe4e45ad4a088aac5b327.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 81e8aa34984a29b9f5e1e017fcdc76c06a8da2c26edbe4e45ad4a088aac5b327.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3396 81e8aa34984a29b9f5e1e017fcdc76c06a8da2c26edbe4e45ad4a088aac5b327.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3396 81e8aa34984a29b9f5e1e017fcdc76c06a8da2c26edbe4e45ad4a088aac5b327.exe 3396 81e8aa34984a29b9f5e1e017fcdc76c06a8da2c26edbe4e45ad4a088aac5b327.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81e8aa34984a29b9f5e1e017fcdc76c06a8da2c26edbe4e45ad4a088aac5b327.exe"C:\Users\Admin\AppData\Local\Temp\81e8aa34984a29b9f5e1e017fcdc76c06a8da2c26edbe4e45ad4a088aac5b327.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
418KB
MD5f342d254fdd33e76b2fd6a3f8b517de3
SHA179c91621ea96a6635e3934e9b46dcf23d1fc762e
SHA2568ccde337ed97230a54e20db8608e3e74e6dbe3f4d153846a07484c2fa5ae596a
SHA512618963615db38d9ead4855555e7ca7558b0f3c9cc425a950e3f3457d49a5b50645fc9718a0693398d07bc1d822067e9fd8289d45f889586884daf25aedeb6cba