Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 05:05

General

  • Target

    66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exe

  • Size

    6.3MB

  • MD5

    bd82b7f1ca3fc585875fcb075bb68cd1

  • SHA1

    7a5903d964cae5f89ce38316bf769160a7ffc0a9

  • SHA256

    66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f

  • SHA512

    900a02ebf55a52baf08538526488117be0b1a3b24957b1c491d352eb3fbe756fce883baaa37b33c790a654a62d6b9a17cb6d89d5927bbceee8d3e9be41bb1ec6

  • SSDEEP

    196608:+I73LC7GUybbWkgcOjymf+uauNC+9fii/97BC:+I73LmGzWkZOjymNIaf7e

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Themida packer 5 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exe
    "C:\Users\Admin\AppData\Local\Temp\66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 392
      2⤵
      • Program crash
      PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\E2EECore.2.7.2.dll
    Filesize

    8.4MB

    MD5

    8b6c94bbdbfb213e94a5dcb4fac28ce3

    SHA1

    b56102ca4f03556f387f8b30e2b404efabe0cb65

    SHA256

    982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53

    SHA512

    9d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a

  • memory/1712-0-0x0000000000400000-0x0000000000FA4000-memory.dmp
    Filesize

    11.6MB

  • memory/1712-1-0x0000000077970000-0x0000000077972000-memory.dmp
    Filesize

    8KB

  • memory/1712-3-0x0000000000400000-0x0000000000FA4000-memory.dmp
    Filesize

    11.6MB

  • memory/1712-2-0x0000000000400000-0x0000000000FA4000-memory.dmp
    Filesize

    11.6MB

  • memory/1712-4-0x0000000000400000-0x0000000000FA4000-memory.dmp
    Filesize

    11.6MB

  • memory/1712-9-0x0000000000400000-0x0000000000FA4000-memory.dmp
    Filesize

    11.6MB