Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 05:05
Behavioral task
behavioral1
Sample
66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exe
Resource
win7-20231129-en
General
-
Target
66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exe
-
Size
6.3MB
-
MD5
bd82b7f1ca3fc585875fcb075bb68cd1
-
SHA1
7a5903d964cae5f89ce38316bf769160a7ffc0a9
-
SHA256
66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f
-
SHA512
900a02ebf55a52baf08538526488117be0b1a3b24957b1c491d352eb3fbe756fce883baaa37b33c790a654a62d6b9a17cb6d89d5927bbceee8d3e9be41bb1ec6
-
SSDEEP
196608:+I73LC7GUybbWkgcOjymf+uauNC+9fii/97BC:+I73LmGzWkZOjymNIaf7e
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exe -
Loads dropped DLL 1 IoCs
Processes:
66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exepid process 1712 66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exe -
Processes:
resource yara_rule behavioral1/memory/1712-0-0x0000000000400000-0x0000000000FA4000-memory.dmp themida behavioral1/memory/1712-3-0x0000000000400000-0x0000000000FA4000-memory.dmp themida behavioral1/memory/1712-2-0x0000000000400000-0x0000000000FA4000-memory.dmp themida behavioral1/memory/1712-4-0x0000000000400000-0x0000000000FA4000-memory.dmp themida behavioral1/memory/1712-9-0x0000000000400000-0x0000000000FA4000-memory.dmp themida -
Processes:
66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exepid process 1712 66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3004 1712 WerFault.exe 66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exepid process 1712 66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exe 1712 66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exedescription pid process target process PID 1712 wrote to memory of 3004 1712 66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exe WerFault.exe PID 1712 wrote to memory of 3004 1712 66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exe WerFault.exe PID 1712 wrote to memory of 3004 1712 66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exe WerFault.exe PID 1712 wrote to memory of 3004 1712 66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exe"C:\Users\Admin\AppData\Local\Temp\66208933a62ec961b67c6289459c6ead98a1fcc8a6bfa7ffba405f8db4cdf38f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 3922⤵
- Program crash
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a