Analysis

  • max time kernel
    59s
  • max time network
    60s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    23-05-2024 23:34

General

  • Target

    Load.exe

  • Size

    6.0MB

  • MD5

    1af5555e5faebf3e72b33b5daa3681c9

  • SHA1

    f54476a3e33fb65bf4b6b87abec40c6782dd8caf

  • SHA256

    b3badd0202dcefd52f83d3e75a479ba4dfe49985e87f03db1d70e36214c2da67

  • SHA512

    da7fea89a348f31bf0c80a35744c624278a08eb3ae9a354b70908268a8757b2c900169bf5f95b0553c748b19cc415430e89974554c880916882f67d6b63e9867

  • SSDEEP

    98304:80IiypQCBRbpAJk9ylbt8xR8afX7yD6mysx8FAv3RlCesbekRlwbOMF:lIpQCBReJRbtwWazjcHS3MF

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Load.exe
    "C:\Users\Admin\AppData\Local\Temp\Load.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:208
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=es --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3936,i,10930486053833527602,16911755241823523803,262144 --variations-seed-version --mojo-platform-channel-handle=3820 /prefetch:8
    1⤵
      PID:2564

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/208-0-0x0000000000B00000-0x0000000001660000-memory.dmp

      Filesize

      11.4MB

    • memory/208-2-0x0000000075FC0000-0x00000000760B0000-memory.dmp

      Filesize

      960KB

    • memory/208-1-0x0000000075FE0000-0x0000000075FE1000-memory.dmp

      Filesize

      4KB

    • memory/208-3-0x0000000075FC0000-0x00000000760B0000-memory.dmp

      Filesize

      960KB

    • memory/208-4-0x0000000075FC0000-0x00000000760B0000-memory.dmp

      Filesize

      960KB

    • memory/208-5-0x0000000075FC0000-0x00000000760B0000-memory.dmp

      Filesize

      960KB

    • memory/208-6-0x0000000075FC0000-0x00000000760B0000-memory.dmp

      Filesize

      960KB

    • memory/208-7-0x0000000075FC0000-0x00000000760B0000-memory.dmp

      Filesize

      960KB

    • memory/208-8-0x0000000075FC0000-0x00000000760B0000-memory.dmp

      Filesize

      960KB

    • memory/208-9-0x0000000075FC0000-0x00000000760B0000-memory.dmp

      Filesize

      960KB

    • memory/208-12-0x0000000000B00000-0x0000000001660000-memory.dmp

      Filesize

      11.4MB

    • memory/208-13-0x0000000000B00000-0x0000000001660000-memory.dmp

      Filesize

      11.4MB

    • memory/208-14-0x00000000063B0000-0x0000000006954000-memory.dmp

      Filesize

      5.6MB

    • memory/208-15-0x0000000005E00000-0x0000000005E92000-memory.dmp

      Filesize

      584KB

    • memory/208-16-0x0000000005D90000-0x0000000005DDE000-memory.dmp

      Filesize

      312KB

    • memory/208-17-0x0000000007510000-0x0000000007612000-memory.dmp

      Filesize

      1.0MB

    • memory/208-18-0x0000000007910000-0x0000000007922000-memory.dmp

      Filesize

      72KB

    • memory/208-19-0x0000000007AD0000-0x0000000007B0C000-memory.dmp

      Filesize

      240KB

    • memory/208-20-0x0000000007AB0000-0x0000000007AD0000-memory.dmp

      Filesize

      128KB

    • memory/208-21-0x0000000007DA0000-0x0000000007DAA000-memory.dmp

      Filesize

      40KB

    • memory/208-22-0x0000000007DD0000-0x00000000081A6000-memory.dmp

      Filesize

      3.8MB

    • memory/208-24-0x0000000075FC0000-0x00000000760B0000-memory.dmp

      Filesize

      960KB

    • memory/208-23-0x0000000000B00000-0x0000000001660000-memory.dmp

      Filesize

      11.4MB

    • memory/208-25-0x000000000A9C0000-0x000000000AA78000-memory.dmp

      Filesize

      736KB

    • memory/208-26-0x000000000AD80000-0x000000000ADC0000-memory.dmp

      Filesize

      256KB

    • memory/208-27-0x0000000075FE0000-0x0000000075FE1000-memory.dmp

      Filesize

      4KB

    • memory/208-28-0x000000000B7D0000-0x000000000B86C000-memory.dmp

      Filesize

      624KB

    • memory/208-29-0x0000000075FC0000-0x00000000760B0000-memory.dmp

      Filesize

      960KB

    • memory/208-31-0x0000000075FC0000-0x00000000760B0000-memory.dmp

      Filesize

      960KB

    • memory/208-32-0x0000000075FC0000-0x00000000760B0000-memory.dmp

      Filesize

      960KB

    • memory/208-33-0x0000000075FC0000-0x00000000760B0000-memory.dmp

      Filesize

      960KB

    • memory/208-34-0x0000000075FC0000-0x00000000760B0000-memory.dmp

      Filesize

      960KB

    • memory/208-36-0x0000000075FC0000-0x00000000760B0000-memory.dmp

      Filesize

      960KB

    • memory/208-37-0x0000000075FC0000-0x00000000760B0000-memory.dmp

      Filesize

      960KB

    • memory/208-38-0x0000000075FC0000-0x00000000760B0000-memory.dmp

      Filesize

      960KB

    • memory/208-39-0x0000000075FC0000-0x00000000760B0000-memory.dmp

      Filesize

      960KB