Overview
overview
10Static
static
7file_x86x6...40.dll
windows7-x64
1file_x86x6...40.dll
windows10-2004-x64
1file_x86x6...le.exe
windows7-x64
10file_x86x6...le.exe
windows10-2004-x64
10file_x86x6...40.dll
windows7-x64
1file_x86x6...40.dll
windows10-2004-x64
1file_x86x6..._a.pyc
windows7-x64
3file_x86x6..._a.pyc
windows10-2004-x64
3Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 20:33
Behavioral task
behavioral1
Sample
file_x86x64_release/concrt140.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
file_x86x64_release/concrt140.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
file_x86x64_release/file.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
file_x86x64_release/file.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
file_x86x64_release/msvcp140.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
file_x86x64_release/msvcp140.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
file_x86x64_release/res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
file_x86x64_release/res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc
Resource
win10v2004-20240426-en
General
-
Target
file_x86x64_release/file.exe
-
Size
712.0MB
-
MD5
1b46efea69196395a3c449b51f34db34
-
SHA1
48f324b80cd0a99ae86b524ec87d0730b795829e
-
SHA256
ff5ef2b18f72873d947d56ff4d5e9ad98af122cd7260d9b2ae931f81df1fc4a7
-
SHA512
c92907ccd3ad05cd42ab34e71dfc4e45d5b4d6307411d880506197640210d82db726c467fb76bb773a96409a0d23484578c2825b1bc50103cc9b4636cbce2003
-
SSDEEP
98304:zTW+uIGD8foJWXlj+F2gMFqA/sOVfeS5zc4UcwqyB4qNGDPXRDCOBc4S5BTjGv0e:3QIGD8UyxfrRRfngGDqefMOBcxTg0lI
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 1 IoCs
Processes:
file.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" file.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
file.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
file.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe -
Processes:
resource yara_rule behavioral4/memory/3316-0-0x0000000140000000-0x0000000140BAF000-memory.dmp themida behavioral4/memory/3316-8-0x0000000140000000-0x0000000140BAF000-memory.dmp themida behavioral4/memory/3316-9-0x0000000140000000-0x0000000140BAF000-memory.dmp themida behavioral4/memory/3316-10-0x0000000140000000-0x0000000140BAF000-memory.dmp themida behavioral4/memory/3316-7-0x0000000140000000-0x0000000140BAF000-memory.dmp themida behavioral4/memory/3316-19-0x0000000140000000-0x0000000140BAF000-memory.dmp themida -
Processes:
file.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 17 api.myip.com 18 api.myip.com 19 ipinfo.io 20 ipinfo.io -
Drops file in System32 directory 4 IoCs
Processes:
file.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy file.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini file.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol file.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI file.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
file.exepid process 3316 file.exe 3316 file.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file_x86x64_release\file.exe"C:\Users\Admin\AppData\Local\Temp\file_x86x64_release\file.exe"1⤵
- Modifies firewall policy service
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3316
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2904
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:1280