Analysis
-
max time kernel
590s -
max time network
358s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 15:34
Behavioral task
behavioral1
Sample
Pop-up Bypass_[unknowncheats.me]_.exe
Resource
win7-20240215-en
windows7-x64
10 signatures
600 seconds
General
-
Target
Pop-up Bypass_[unknowncheats.me]_.exe
-
Size
3.3MB
-
MD5
cb683f37f0902ce6620eb94f0ccd8a87
-
SHA1
53a9dcd66067278d83a69dda13b11923df65494e
-
SHA256
893b07a3803d12a3f68b7ba487ec3c89b832604880b08374b543913c68e181d3
-
SHA512
bfbd8733ae4fc9e50e7a8447eeb9fe89b3e46cca4e3eb70a5bd111413171fd89fd89c997be3957bcbdf90bc41bc24e66c771617bc5c670b509e11a3cc2f70dff
-
SSDEEP
98304:nCNLxgjTecpczSWUQju2WehX/EiJWeRS/AZ:bR+AZ2Wava4Z
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Pop-up Bypass_[unknowncheats.me]_.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Pop-up Bypass_[unknowncheats.me]_.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Pop-up Bypass_[unknowncheats.me]_.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Pop-up Bypass_[unknowncheats.me]_.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Pop-up Bypass_[unknowncheats.me]_.exe -
Processes:
resource yara_rule behavioral1/memory/1888-31-0x0000000000A10000-0x00000000012D2000-memory.dmp themida behavioral1/memory/1888-32-0x0000000000A10000-0x00000000012D2000-memory.dmp themida -
Processes:
Pop-up Bypass_[unknowncheats.me]_.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Pop-up Bypass_[unknowncheats.me]_.exe -
Drops file in System32 directory 1 IoCs
Processes:
Pop-up Bypass_[unknowncheats.me]_.exedescription ioc process File created C:\Windows\SysWOW64\PsSuspend.exe Pop-up Bypass_[unknowncheats.me]_.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Pop-up Bypass_[unknowncheats.me]_.exepid process 1888 Pop-up Bypass_[unknowncheats.me]_.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2528 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2972 1888 WerFault.exe Pop-up Bypass_[unknowncheats.me]_.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Pop-up Bypass_[unknowncheats.me]_.exepid process 1888 Pop-up Bypass_[unknowncheats.me]_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
Pop-up Bypass_[unknowncheats.me]_.execmd.exedescription pid process target process PID 1888 wrote to memory of 2804 1888 Pop-up Bypass_[unknowncheats.me]_.exe cmd.exe PID 1888 wrote to memory of 2804 1888 Pop-up Bypass_[unknowncheats.me]_.exe cmd.exe PID 1888 wrote to memory of 2804 1888 Pop-up Bypass_[unknowncheats.me]_.exe cmd.exe PID 1888 wrote to memory of 2804 1888 Pop-up Bypass_[unknowncheats.me]_.exe cmd.exe PID 2804 wrote to memory of 2528 2804 cmd.exe sc.exe PID 2804 wrote to memory of 2528 2804 cmd.exe sc.exe PID 2804 wrote to memory of 2528 2804 cmd.exe sc.exe PID 2804 wrote to memory of 2528 2804 cmd.exe sc.exe PID 2804 wrote to memory of 2404 2804 cmd.exe findstr.exe PID 2804 wrote to memory of 2404 2804 cmd.exe findstr.exe PID 2804 wrote to memory of 2404 2804 cmd.exe findstr.exe PID 2804 wrote to memory of 2404 2804 cmd.exe findstr.exe PID 1888 wrote to memory of 2972 1888 Pop-up Bypass_[unknowncheats.me]_.exe WerFault.exe PID 1888 wrote to memory of 2972 1888 Pop-up Bypass_[unknowncheats.me]_.exe WerFault.exe PID 1888 wrote to memory of 2972 1888 Pop-up Bypass_[unknowncheats.me]_.exe WerFault.exe PID 1888 wrote to memory of 2972 1888 Pop-up Bypass_[unknowncheats.me]_.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Pop-up Bypass_[unknowncheats.me]_.exe"C:\Users\Admin\AppData\Local\Temp\Pop-up Bypass_[unknowncheats.me]_.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc queryex BrokerInfrastructure | findstr PID2⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\sc.exesc queryex BrokerInfrastructure3⤵
- Launches sc.exe
PID:2528
-
-
C:\Windows\SysWOW64\findstr.exefindstr PID3⤵PID:2404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 5922⤵
- Program crash
PID:2972
-