Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 03:48
Behavioral task
behavioral1
Sample
1649d63956459c1aaa9d1e4856ec985798b8762e1d26a4bf24dc147d8efd5408.exe
Resource
win7-20240220-en
windows7-x64
5 signatures
150 seconds
General
-
Target
1649d63956459c1aaa9d1e4856ec985798b8762e1d26a4bf24dc147d8efd5408.exe
-
Size
4.3MB
-
MD5
eddcfbf29eab630cb154edac3521d17e
-
SHA1
42fe0fb2705a796bffa348162263a952c9c62679
-
SHA256
1649d63956459c1aaa9d1e4856ec985798b8762e1d26a4bf24dc147d8efd5408
-
SHA512
a714ab1a92cdc706d1079c6e02f74438ab682d9d010a960bf7f2f8f0a37d17b718bb4ea55253fe05bac53c979985316d7c6cfc1bfdf10cbd858131658436216e
-
SSDEEP
98304:AQ7a+V0zMwO7oECepheOLtl3dEeGJMV+tzVoTrxAIhRXrQkwE:J75QMwO7oZeBl3zGJKqkrxLhRJwE
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
1649d63956459c1aaa9d1e4856ec985798b8762e1d26a4bf24dc147d8efd5408.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1649d63956459c1aaa9d1e4856ec985798b8762e1d26a4bf24dc147d8efd5408.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
1649d63956459c1aaa9d1e4856ec985798b8762e1d26a4bf24dc147d8efd5408.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1649d63956459c1aaa9d1e4856ec985798b8762e1d26a4bf24dc147d8efd5408.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1649d63956459c1aaa9d1e4856ec985798b8762e1d26a4bf24dc147d8efd5408.exe -
Processes:
resource yara_rule behavioral1/memory/3064-2-0x00000000010C0000-0x0000000001B76000-memory.dmp themida behavioral1/memory/3064-3-0x00000000010C0000-0x0000000001B76000-memory.dmp themida behavioral1/memory/3064-1-0x00000000010C0000-0x0000000001B76000-memory.dmp themida behavioral1/memory/3064-5-0x00000000010C0000-0x0000000001B76000-memory.dmp themida behavioral1/memory/3064-4-0x00000000010C0000-0x0000000001B76000-memory.dmp themida behavioral1/memory/3064-7-0x00000000010C0000-0x0000000001B76000-memory.dmp themida -
Processes:
1649d63956459c1aaa9d1e4856ec985798b8762e1d26a4bf24dc147d8efd5408.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1649d63956459c1aaa9d1e4856ec985798b8762e1d26a4bf24dc147d8efd5408.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
1649d63956459c1aaa9d1e4856ec985798b8762e1d26a4bf24dc147d8efd5408.exepid process 3064 1649d63956459c1aaa9d1e4856ec985798b8762e1d26a4bf24dc147d8efd5408.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1649d63956459c1aaa9d1e4856ec985798b8762e1d26a4bf24dc147d8efd5408.exe"C:\Users\Admin\AppData\Local\Temp\1649d63956459c1aaa9d1e4856ec985798b8762e1d26a4bf24dc147d8efd5408.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3064