Analysis
-
max time kernel
59s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-es -
resource tags
arch:x64arch:x86image:win10v2004-20240508-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
23-05-2024 23:34
General
-
Target
Load.exe
-
Size
6.0MB
-
MD5
1af5555e5faebf3e72b33b5daa3681c9
-
SHA1
f54476a3e33fb65bf4b6b87abec40c6782dd8caf
-
SHA256
b3badd0202dcefd52f83d3e75a479ba4dfe49985e87f03db1d70e36214c2da67
-
SHA512
da7fea89a348f31bf0c80a35744c624278a08eb3ae9a354b70908268a8757b2c900169bf5f95b0553c748b19cc415430e89974554c880916882f67d6b63e9867
-
SSDEEP
98304:80IiypQCBRbpAJk9ylbt8xR8afX7yD6mysx8FAv3RlCesbekRlwbOMF:lIpQCBReJRbtwWazjcHS3MF
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Load.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Load.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Load.exe -
resource yara_rule behavioral1/memory/208-12-0x0000000000B00000-0x0000000001660000-memory.dmp themida behavioral1/memory/208-13-0x0000000000B00000-0x0000000001660000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Load.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 208 Load.exe 208 Load.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe 208 Load.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 208 Load.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Load.exe"C:\Users\Admin\AppData\Local\Temp\Load.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:208
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=es --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3936,i,10930486053833527602,16911755241823523803,262144 --variations-seed-version --mojo-platform-channel-handle=3820 /prefetch:81⤵PID:2564