Analysis
-
max time kernel
162s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:46
Behavioral task
behavioral1
Sample
94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exe
Resource
win7-20240221-en
General
-
Target
94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exe
-
Size
5.1MB
-
MD5
029b4a16951a6fb1f6a1fda9b39769b7
-
SHA1
a64e56dc24e713637af0ef71b279f39843e0f0eb
-
SHA256
94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61
-
SHA512
3a117b879f96c42387cc088a2f05f441222f0dfbfb4f405f1e09bc03f92cdfb27ffa986a1f9ad4ad1e6e8d2387d3c367a54dcf51a7c2e1f32f48fb15b8406bfc
-
SSDEEP
98304:tfblDCLzsVGzo6WvZ4vALxjloC4/ozr0J:tblO8V+o6dv4iFAnc
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 1 IoCs
Processes:
94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" 94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Detects executables packed with Themida 12 IoCs
Processes:
resource yara_rule behavioral2/memory/640-0-0x0000000000A10000-0x00000000010D7000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/640-9-0x0000000000A10000-0x00000000010D7000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/640-10-0x0000000000A10000-0x00000000010D7000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/640-11-0x0000000000A10000-0x00000000010D7000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/640-12-0x0000000000A10000-0x00000000010D7000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/640-14-0x0000000000A10000-0x00000000010D7000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/640-13-0x0000000000A10000-0x00000000010D7000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/640-15-0x0000000000A10000-0x00000000010D7000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/640-16-0x0000000000A10000-0x00000000010D7000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/640-17-0x0000000000A10000-0x00000000010D7000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/640-24-0x0000000000A10000-0x00000000010D7000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/640-33-0x0000000000A10000-0x00000000010D7000-memory.dmp INDICATOR_EXE_Packed_Themida -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exe -
Processes:
resource yara_rule behavioral2/memory/640-0-0x0000000000A10000-0x00000000010D7000-memory.dmp themida behavioral2/memory/640-9-0x0000000000A10000-0x00000000010D7000-memory.dmp themida behavioral2/memory/640-10-0x0000000000A10000-0x00000000010D7000-memory.dmp themida behavioral2/memory/640-11-0x0000000000A10000-0x00000000010D7000-memory.dmp themida behavioral2/memory/640-12-0x0000000000A10000-0x00000000010D7000-memory.dmp themida behavioral2/memory/640-14-0x0000000000A10000-0x00000000010D7000-memory.dmp themida behavioral2/memory/640-13-0x0000000000A10000-0x00000000010D7000-memory.dmp themida behavioral2/memory/640-15-0x0000000000A10000-0x00000000010D7000-memory.dmp themida behavioral2/memory/640-16-0x0000000000A10000-0x00000000010D7000-memory.dmp themida behavioral2/memory/640-17-0x0000000000A10000-0x00000000010D7000-memory.dmp themida behavioral2/memory/640-24-0x0000000000A10000-0x00000000010D7000-memory.dmp themida behavioral2/memory/640-33-0x0000000000A10000-0x00000000010D7000-memory.dmp themida -
Processes:
94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 23 api.myip.com 25 api.myip.com 27 ipinfo.io 28 ipinfo.io -
Drops file in System32 directory 4 IoCs
Processes:
94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exedescription ioc process File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exe File opened for modification C:\Windows\System32\GroupPolicy 94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exepid process 640 94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exepid process 640 94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exe 640 94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exe"C:\Users\Admin\AppData\Local\Temp\94db25630e224de4d562f408ca6ed1259eae3645931174fcd57c07ad6933aa61.exe"1⤵
- Modifies firewall policy service
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:1664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:1648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3752 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:1736