Resubmissions

22-05-2024 12:32

240522-pqnvyabd99 9

22-05-2024 11:59

240522-n5t5tsfh42 9

General

  • Target

    setup.exe

  • Size

    19.1MB

  • Sample

    240522-pqnvyabd99

  • MD5

    34f53da9221434c6348b043bfe5804f2

  • SHA1

    accd7e559edd2bf8841c643e7dc2ef4c3568c8bc

  • SHA256

    36fbd44761d21b9229fe8260f047a3fd4901c3155818b3089f7bf03d183f05d4

  • SHA512

    f8b60f8230b72035eaeb1a1e051b945e2fc2f8323c25a40327b58a14101d134e3fbca0a2940e01955486d3df81cd5f6c8da366382742321e1874f21c850ac8ea

  • SSDEEP

    393216:aI6OdCYRTAGc54PLHn71KPwhuSpbV2AYZxSn1UwOdjVhPoIx4r6B:qmL9AGc54PLJb0Ib4AYZ61N2jX4r6B

Malware Config

Targets

    • Target

      setup.exe

    • Size

      19.1MB

    • MD5

      34f53da9221434c6348b043bfe5804f2

    • SHA1

      accd7e559edd2bf8841c643e7dc2ef4c3568c8bc

    • SHA256

      36fbd44761d21b9229fe8260f047a3fd4901c3155818b3089f7bf03d183f05d4

    • SHA512

      f8b60f8230b72035eaeb1a1e051b945e2fc2f8323c25a40327b58a14101d134e3fbca0a2940e01955486d3df81cd5f6c8da366382742321e1874f21c850ac8ea

    • SSDEEP

      393216:aI6OdCYRTAGc54PLHn71KPwhuSpbV2AYZxSn1UwOdjVhPoIx4r6B:qmL9AGc54PLJb0Ib4AYZ61N2jX4r6B

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Tasks