Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 03:48

General

  • Target

    1649d63956459c1aaa9d1e4856ec985798b8762e1d26a4bf24dc147d8efd5408.exe

  • Size

    4.3MB

  • MD5

    eddcfbf29eab630cb154edac3521d17e

  • SHA1

    42fe0fb2705a796bffa348162263a952c9c62679

  • SHA256

    1649d63956459c1aaa9d1e4856ec985798b8762e1d26a4bf24dc147d8efd5408

  • SHA512

    a714ab1a92cdc706d1079c6e02f74438ab682d9d010a960bf7f2f8f0a37d17b718bb4ea55253fe05bac53c979985316d7c6cfc1bfdf10cbd858131658436216e

  • SSDEEP

    98304:AQ7a+V0zMwO7oECepheOLtl3dEeGJMV+tzVoTrxAIhRXrQkwE:J75QMwO7oZeBl3zGJKqkrxLhRJwE

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 6 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1649d63956459c1aaa9d1e4856ec985798b8762e1d26a4bf24dc147d8efd5408.exe
    "C:\Users\Admin\AppData\Local\Temp\1649d63956459c1aaa9d1e4856ec985798b8762e1d26a4bf24dc147d8efd5408.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3064-0-0x0000000077BC0000-0x0000000077BC2000-memory.dmp

    Filesize

    8KB

  • memory/3064-2-0x00000000010C0000-0x0000000001B76000-memory.dmp

    Filesize

    10.7MB

  • memory/3064-3-0x00000000010C0000-0x0000000001B76000-memory.dmp

    Filesize

    10.7MB

  • memory/3064-1-0x00000000010C0000-0x0000000001B76000-memory.dmp

    Filesize

    10.7MB

  • memory/3064-5-0x00000000010C0000-0x0000000001B76000-memory.dmp

    Filesize

    10.7MB

  • memory/3064-6-0x000000000129D000-0x0000000001721000-memory.dmp

    Filesize

    4.5MB

  • memory/3064-4-0x00000000010C0000-0x0000000001B76000-memory.dmp

    Filesize

    10.7MB

  • memory/3064-8-0x000000000129D000-0x0000000001721000-memory.dmp

    Filesize

    4.5MB

  • memory/3064-7-0x00000000010C0000-0x0000000001B76000-memory.dmp

    Filesize

    10.7MB