Analysis
-
max time kernel
592s -
max time network
451s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 15:34
Behavioral task
behavioral1
Sample
Pop-up Bypass_[unknowncheats.me]_.exe
Resource
win7-20240215-en
windows7-x64
10 signatures
600 seconds
General
-
Target
Pop-up Bypass_[unknowncheats.me]_.exe
-
Size
3.3MB
-
MD5
cb683f37f0902ce6620eb94f0ccd8a87
-
SHA1
53a9dcd66067278d83a69dda13b11923df65494e
-
SHA256
893b07a3803d12a3f68b7ba487ec3c89b832604880b08374b543913c68e181d3
-
SHA512
bfbd8733ae4fc9e50e7a8447eeb9fe89b3e46cca4e3eb70a5bd111413171fd89fd89c997be3957bcbdf90bc41bc24e66c771617bc5c670b509e11a3cc2f70dff
-
SSDEEP
98304:nCNLxgjTecpczSWUQju2WehX/EiJWeRS/AZ:bR+AZ2Wava4Z
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Pop-up Bypass_[unknowncheats.me]_.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Pop-up Bypass_[unknowncheats.me]_.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Pop-up Bypass_[unknowncheats.me]_.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Pop-up Bypass_[unknowncheats.me]_.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Pop-up Bypass_[unknowncheats.me]_.exe -
Processes:
resource yara_rule behavioral2/memory/1468-11-0x00000000000F0000-0x00000000009B2000-memory.dmp themida behavioral2/memory/1468-12-0x00000000000F0000-0x00000000009B2000-memory.dmp themida -
Processes:
Pop-up Bypass_[unknowncheats.me]_.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Pop-up Bypass_[unknowncheats.me]_.exe -
Drops file in System32 directory 1 IoCs
Processes:
Pop-up Bypass_[unknowncheats.me]_.exedescription ioc process File created C:\Windows\SysWOW64\PsSuspend.exe Pop-up Bypass_[unknowncheats.me]_.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Pop-up Bypass_[unknowncheats.me]_.exepid process 1468 Pop-up Bypass_[unknowncheats.me]_.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 4596 sc.exe 3860 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Pop-up Bypass_[unknowncheats.me]_.exepid process 1468 Pop-up Bypass_[unknowncheats.me]_.exe 1468 Pop-up Bypass_[unknowncheats.me]_.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
Pop-up Bypass_[unknowncheats.me]_.execmd.execmd.exedescription pid process target process PID 1468 wrote to memory of 4416 1468 Pop-up Bypass_[unknowncheats.me]_.exe cmd.exe PID 1468 wrote to memory of 4416 1468 Pop-up Bypass_[unknowncheats.me]_.exe cmd.exe PID 1468 wrote to memory of 4416 1468 Pop-up Bypass_[unknowncheats.me]_.exe cmd.exe PID 4416 wrote to memory of 4596 4416 cmd.exe sc.exe PID 4416 wrote to memory of 4596 4416 cmd.exe sc.exe PID 4416 wrote to memory of 4596 4416 cmd.exe sc.exe PID 4416 wrote to memory of 3972 4416 cmd.exe findstr.exe PID 4416 wrote to memory of 3972 4416 cmd.exe findstr.exe PID 4416 wrote to memory of 3972 4416 cmd.exe findstr.exe PID 1468 wrote to memory of 5052 1468 Pop-up Bypass_[unknowncheats.me]_.exe cmd.exe PID 1468 wrote to memory of 5052 1468 Pop-up Bypass_[unknowncheats.me]_.exe cmd.exe PID 1468 wrote to memory of 5052 1468 Pop-up Bypass_[unknowncheats.me]_.exe cmd.exe PID 5052 wrote to memory of 3860 5052 cmd.exe sc.exe PID 5052 wrote to memory of 3860 5052 cmd.exe sc.exe PID 5052 wrote to memory of 3860 5052 cmd.exe sc.exe PID 5052 wrote to memory of 2112 5052 cmd.exe findstr.exe PID 5052 wrote to memory of 2112 5052 cmd.exe findstr.exe PID 5052 wrote to memory of 2112 5052 cmd.exe findstr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Pop-up Bypass_[unknowncheats.me]_.exe"C:\Users\Admin\AppData\Local\Temp\Pop-up Bypass_[unknowncheats.me]_.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc queryex BrokerInfrastructure | findstr PID2⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\sc.exesc queryex BrokerInfrastructure3⤵
- Launches sc.exe
PID:4596
-
-
C:\Windows\SysWOW64\findstr.exefindstr PID3⤵PID:3972
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc queryex LSM | findstr PID2⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\sc.exesc queryex LSM3⤵
- Launches sc.exe
PID:3860
-
-
C:\Windows\SysWOW64\findstr.exefindstr PID3⤵PID:2112
-
-