Analysis
-
max time kernel
130s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 19:48
Behavioral task
behavioral1
Sample
bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exe
Resource
win7-20231129-en
General
-
Target
bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exe
-
Size
5.4MB
-
MD5
c53a2570ddcfdbd96f1eca0efb65afb3
-
SHA1
84e52665eb4f458ee145fb1ebfa422cd5fedc611
-
SHA256
bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8
-
SHA512
f314289acbaa782eb4113928e6a07faca9c1bbb0ee72562f316a0656f89dce9ff39dcf1182fbc914e962968428676337c6077079443999f4d2ee0af8b7bd93e8
-
SSDEEP
98304:VfOY8AXs2F3LBZJHZKWrfpLp97maUL5uFu3zoo668uSP10mJP6WnytQlkHvbp9Ey:R3D82J9LHZKWjpF97ma3azop68FPTZ65
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exe -
Loads dropped DLL 1 IoCs
Processes:
bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exepid process 2108 bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exe -
Processes:
resource yara_rule behavioral2/memory/2108-0-0x0000000000400000-0x000000000114B000-memory.dmp themida behavioral2/memory/2108-2-0x0000000000400000-0x000000000114B000-memory.dmp themida behavioral2/memory/2108-4-0x0000000000400000-0x000000000114B000-memory.dmp themida behavioral2/memory/2108-3-0x0000000000400000-0x000000000114B000-memory.dmp themida behavioral2/memory/2108-12-0x0000000000400000-0x000000000114B000-memory.dmp themida -
Processes:
bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exepid process 2108 bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5008 2108 WerFault.exe bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exepid process 2108 bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exe 2108 bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exe 2108 bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exe 2108 bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exepid process 2108 bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exepid process 2108 bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exepid process 2108 bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exe 2108 bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exe 2108 bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exe"C:\Users\Admin\AppData\Local\Temp\bb642e4d8f8e9b0151d3e830dc453f0c2d321acd46baef7ca9476d2543ad85e8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 13282⤵
- Program crash
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2108 -ip 21081⤵PID:2164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD54bc970a97300b1a725d44bba23d8697a
SHA16f1eb181153692814e038e2f851d0734646f78f8
SHA256c9d8fb5311ae6018dc1ca72774cb7efeba5c115c827a5cfb795b3580499e323d
SHA51203968ca876b7e584de0a1418cca1dd2036fd0b4744f86d69aee5691a42061e284f8d9577293ef3f656be332f7da5ca276f85c6393bd6d8eb7de181baec0285f8