Analysis
-
max time kernel
291s -
max time network
190s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
24-05-2024 00:51
Behavioral task
behavioral1
Sample
906d9dd5e2823624ddf2ed7c6d02c3dbf5f77c4217c0d0ada568ed9945abd7a8.exe
Resource
win7-20240220-en
General
-
Target
906d9dd5e2823624ddf2ed7c6d02c3dbf5f77c4217c0d0ada568ed9945abd7a8.exe
-
Size
2.1MB
-
MD5
35dc3890705c96d323ee1f9f373ec4da
-
SHA1
17d1fa45b004cc72eee8cecbd4242df312edf26e
-
SHA256
906d9dd5e2823624ddf2ed7c6d02c3dbf5f77c4217c0d0ada568ed9945abd7a8
-
SHA512
1d97ad4e83f5aedda9e7476f12aa19cbebdc0cd5815327db2cd45940678e1288d33c4b0261cef3b73c445758a90eb8b550521aa18136d9080f0f27da4abdc37b
-
SSDEEP
49152:BUDZKfDQYS4ruXTusuilpYhvOqQoI8P33zH:BUIrIPXVppmb
Malware Config
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
906d9dd5e2823624ddf2ed7c6d02c3dbf5f77c4217c0d0ada568ed9945abd7a8.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 906d9dd5e2823624ddf2ed7c6d02c3dbf5f77c4217c0d0ada568ed9945abd7a8.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
906d9dd5e2823624ddf2ed7c6d02c3dbf5f77c4217c0d0ada568ed9945abd7a8.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 906d9dd5e2823624ddf2ed7c6d02c3dbf5f77c4217c0d0ada568ed9945abd7a8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 906d9dd5e2823624ddf2ed7c6d02c3dbf5f77c4217c0d0ada568ed9945abd7a8.exe -
Processes:
resource yara_rule behavioral2/memory/5084-0-0x00000000001C0000-0x0000000000832000-memory.dmp themida behavioral2/memory/5084-2-0x00000000001C0000-0x0000000000832000-memory.dmp themida behavioral2/memory/5084-1-0x00000000001C0000-0x0000000000832000-memory.dmp themida behavioral2/memory/5084-3-0x00000000001C0000-0x0000000000832000-memory.dmp themida behavioral2/memory/5084-4-0x00000000001C0000-0x0000000000832000-memory.dmp themida behavioral2/memory/5084-7-0x00000000001C0000-0x0000000000832000-memory.dmp themida behavioral2/memory/5084-6-0x00000000001C0000-0x0000000000832000-memory.dmp themida behavioral2/memory/5084-5-0x00000000001C0000-0x0000000000832000-memory.dmp themida behavioral2/memory/5084-8-0x00000000001C0000-0x0000000000832000-memory.dmp themida behavioral2/memory/5084-9-0x00000000001C0000-0x0000000000832000-memory.dmp themida behavioral2/memory/5084-10-0x00000000001C0000-0x0000000000832000-memory.dmp themida -
Processes:
906d9dd5e2823624ddf2ed7c6d02c3dbf5f77c4217c0d0ada568ed9945abd7a8.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 906d9dd5e2823624ddf2ed7c6d02c3dbf5f77c4217c0d0ada568ed9945abd7a8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\906d9dd5e2823624ddf2ed7c6d02c3dbf5f77c4217c0d0ada568ed9945abd7a8.exe"C:\Users\Admin\AppData\Local\Temp\906d9dd5e2823624ddf2ed7c6d02c3dbf5f77c4217c0d0ada568ed9945abd7a8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5084-0-0x00000000001C0000-0x0000000000832000-memory.dmpFilesize
6.4MB
-
memory/5084-2-0x00000000001C0000-0x0000000000832000-memory.dmpFilesize
6.4MB
-
memory/5084-1-0x00000000001C0000-0x0000000000832000-memory.dmpFilesize
6.4MB
-
memory/5084-3-0x00000000001C0000-0x0000000000832000-memory.dmpFilesize
6.4MB
-
memory/5084-4-0x00000000001C0000-0x0000000000832000-memory.dmpFilesize
6.4MB
-
memory/5084-7-0x00000000001C0000-0x0000000000832000-memory.dmpFilesize
6.4MB
-
memory/5084-6-0x00000000001C0000-0x0000000000832000-memory.dmpFilesize
6.4MB
-
memory/5084-5-0x00000000001C0000-0x0000000000832000-memory.dmpFilesize
6.4MB
-
memory/5084-8-0x00000000001C0000-0x0000000000832000-memory.dmpFilesize
6.4MB
-
memory/5084-9-0x00000000001C0000-0x0000000000832000-memory.dmpFilesize
6.4MB
-
memory/5084-10-0x00000000001C0000-0x0000000000832000-memory.dmpFilesize
6.4MB