Analysis

  • max time kernel
    137s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 13:22

General

  • Target

    4f8f280ae5dbb931d0b79cba30b912698831dd17b7cf146348642ecbcf90eeae.exe

  • Size

    8.6MB

  • MD5

    bcb0efeb03ab1b4d32d6043f7a223719

  • SHA1

    c5933dcb5d2b4510dc2b61650fd544073da19f88

  • SHA256

    4f8f280ae5dbb931d0b79cba30b912698831dd17b7cf146348642ecbcf90eeae

  • SHA512

    e6aa13e4ea95f21b477b802cc97d4bbfb2f6a908482cdfe08095df2cf83799827335f7fa920ab56016c08c9e849739ac2ce81b4285f4cc68929fff2e33023b4d

  • SSDEEP

    196608:VCO0Bg8tEXBAw4ov3Vhqx3nChywSH9QBOltYDKzwHTK7lHXxv:Vn0BlwBj4ov3VoyhywsaKE+7lH

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 2 IoCs
  • Themida packer 7 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f8f280ae5dbb931d0b79cba30b912698831dd17b7cf146348642ecbcf90eeae.exe
    "C:\Users\Admin\AppData\Local\Temp\4f8f280ae5dbb931d0b79cba30b912698831dd17b7cf146348642ecbcf90eeae.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\E2EECore.2.7.2.dll
    Filesize

    8.4MB

    MD5

    8b6c94bbdbfb213e94a5dcb4fac28ce3

    SHA1

    b56102ca4f03556f387f8b30e2b404efabe0cb65

    SHA256

    982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53

    SHA512

    9d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a

  • C:\Users\Admin\AppData\Roaming\bass.dll
    Filesize

    97KB

    MD5

    df054025c9e845b33b27a99af750f9b9

    SHA1

    cb2a9dc07dada8e2d96d10baee878131aeff0d14

    SHA256

    dfa29cf9a2cbcd8b1dcf7fb7a72764ff2b05e47b056e2a80190338492e0ad0a4

    SHA512

    f1de2207a6ea3bb455ff763bb86404e57a78d0e1d229a0158e41c53507b7b63be926142ee39fae62b6408acb8e5a350ce0f5beaf1823c7d09a4bde88622e4f36

  • memory/972-11-0x0000000010000000-0x0000000010059000-memory.dmp
    Filesize

    356KB

  • memory/972-3-0x0000000000400000-0x00000000013C1000-memory.dmp
    Filesize

    15.8MB

  • memory/972-4-0x0000000000400000-0x00000000013C1000-memory.dmp
    Filesize

    15.8MB

  • memory/972-2-0x0000000000400000-0x00000000013C1000-memory.dmp
    Filesize

    15.8MB

  • memory/972-0-0x0000000000400000-0x00000000013C1000-memory.dmp
    Filesize

    15.8MB

  • memory/972-1-0x0000000077714000-0x0000000077716000-memory.dmp
    Filesize

    8KB

  • memory/972-15-0x0000000011000000-0x0000000011063000-memory.dmp
    Filesize

    396KB

  • memory/972-17-0x0000000003C30000-0x0000000003D46000-memory.dmp
    Filesize

    1.1MB

  • memory/972-27-0x0000000011000000-0x0000000011063000-memory.dmp
    Filesize

    396KB

  • memory/972-26-0x0000000000400000-0x00000000013C1000-memory.dmp
    Filesize

    15.8MB

  • memory/972-30-0x0000000000400000-0x00000000013C1000-memory.dmp
    Filesize

    15.8MB

  • memory/972-32-0x0000000000400000-0x00000000013C1000-memory.dmp
    Filesize

    15.8MB