Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 11:02
Static task
static1
Behavioral task
behavioral1
Sample
02c94e4b35cc6c6f7f27a0313134cd36007fcbaae1b482e109c217c91ddbd5da.exe
Resource
win7-20231129-en
General
-
Target
02c94e4b35cc6c6f7f27a0313134cd36007fcbaae1b482e109c217c91ddbd5da.exe
-
Size
2.3MB
-
MD5
4910d8a49128619c8123dc4ed7cb0940
-
SHA1
4a5de95f54b947f5ab1b99c42dde592b9f92fd6b
-
SHA256
02c94e4b35cc6c6f7f27a0313134cd36007fcbaae1b482e109c217c91ddbd5da
-
SHA512
f00f1a067f15fdeb40ec0b443f6ef72cc211e84c46401a1d5c25eb56e7763c3e98a70ae83b1ec10c87ca771574ccd2248c653b0999845608ba1d3a8e23e11861
-
SSDEEP
49152:ckmKhyq24kI3qebVnlnmqlvXkmI92OhaZa76BFrekn8/7i02XD:ckmKEqlkAb5lnmqlvkmIYEaA6HbD
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
02c94e4b35cc6c6f7f27a0313134cd36007fcbaae1b482e109c217c91ddbd5da.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 02c94e4b35cc6c6f7f27a0313134cd36007fcbaae1b482e109c217c91ddbd5da.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
02c94e4b35cc6c6f7f27a0313134cd36007fcbaae1b482e109c217c91ddbd5da.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 02c94e4b35cc6c6f7f27a0313134cd36007fcbaae1b482e109c217c91ddbd5da.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 02c94e4b35cc6c6f7f27a0313134cd36007fcbaae1b482e109c217c91ddbd5da.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
02c94e4b35cc6c6f7f27a0313134cd36007fcbaae1b482e109c217c91ddbd5da.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Wine 02c94e4b35cc6c6f7f27a0313134cd36007fcbaae1b482e109c217c91ddbd5da.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
02c94e4b35cc6c6f7f27a0313134cd36007fcbaae1b482e109c217c91ddbd5da.exepid process 1720 02c94e4b35cc6c6f7f27a0313134cd36007fcbaae1b482e109c217c91ddbd5da.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
02c94e4b35cc6c6f7f27a0313134cd36007fcbaae1b482e109c217c91ddbd5da.exepid process 1720 02c94e4b35cc6c6f7f27a0313134cd36007fcbaae1b482e109c217c91ddbd5da.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02c94e4b35cc6c6f7f27a0313134cd36007fcbaae1b482e109c217c91ddbd5da.exe"C:\Users\Admin\AppData\Local\Temp\02c94e4b35cc6c6f7f27a0313134cd36007fcbaae1b482e109c217c91ddbd5da.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1720-0-0x0000000000ED0000-0x00000000014A5000-memory.dmpFilesize
5.8MB
-
memory/1720-1-0x0000000077B60000-0x0000000077B62000-memory.dmpFilesize
8KB
-
memory/1720-2-0x0000000000B20000-0x0000000000B21000-memory.dmpFilesize
4KB
-
memory/1720-9-0x0000000000CC0000-0x0000000000CC1000-memory.dmpFilesize
4KB
-
memory/1720-16-0x00000000008C0000-0x00000000008C2000-memory.dmpFilesize
8KB
-
memory/1720-15-0x0000000000E40000-0x0000000000E41000-memory.dmpFilesize
4KB
-
memory/1720-14-0x0000000002A20000-0x0000000002A21000-memory.dmpFilesize
4KB
-
memory/1720-13-0x0000000000AF0000-0x0000000000AF1000-memory.dmpFilesize
4KB
-
memory/1720-12-0x0000000000940000-0x0000000000941000-memory.dmpFilesize
4KB
-
memory/1720-11-0x0000000002900000-0x0000000002901000-memory.dmpFilesize
4KB
-
memory/1720-3-0x0000000000930000-0x0000000000931000-memory.dmpFilesize
4KB
-
memory/1720-10-0x0000000002A30000-0x0000000002A31000-memory.dmpFilesize
4KB
-
memory/1720-8-0x0000000000EB0000-0x0000000000EB1000-memory.dmpFilesize
4KB
-
memory/1720-7-0x0000000000CD0000-0x0000000000CD1000-memory.dmpFilesize
4KB
-
memory/1720-6-0x00000000008D0000-0x00000000008D1000-memory.dmpFilesize
4KB
-
memory/1720-5-0x0000000000EC0000-0x0000000000EC1000-memory.dmpFilesize
4KB
-
memory/1720-4-0x0000000000C70000-0x0000000000C71000-memory.dmpFilesize
4KB
-
memory/1720-17-0x0000000002A40000-0x0000000002A42000-memory.dmpFilesize
8KB
-
memory/1720-18-0x0000000000ED0000-0x00000000014A5000-memory.dmpFilesize
5.8MB
-
memory/1720-19-0x0000000000ED0000-0x00000000014A5000-memory.dmpFilesize
5.8MB
-
memory/1720-20-0x0000000000ED0000-0x00000000014A5000-memory.dmpFilesize
5.8MB
-
memory/1720-21-0x0000000000ED0000-0x00000000014A5000-memory.dmpFilesize
5.8MB
-
memory/1720-22-0x0000000000ED0000-0x00000000014A5000-memory.dmpFilesize
5.8MB
-
memory/1720-23-0x0000000000ED0000-0x00000000014A5000-memory.dmpFilesize
5.8MB
-
memory/1720-24-0x0000000000ED0000-0x00000000014A5000-memory.dmpFilesize
5.8MB
-
memory/1720-25-0x0000000000ED0000-0x00000000014A5000-memory.dmpFilesize
5.8MB
-
memory/1720-26-0x0000000000ED0000-0x00000000014A5000-memory.dmpFilesize
5.8MB
-
memory/1720-27-0x0000000000ED0000-0x00000000014A5000-memory.dmpFilesize
5.8MB
-
memory/1720-28-0x0000000000ED0000-0x00000000014A5000-memory.dmpFilesize
5.8MB
-
memory/1720-29-0x0000000000ED0000-0x00000000014A5000-memory.dmpFilesize
5.8MB
-
memory/1720-30-0x0000000000ED0000-0x00000000014A5000-memory.dmpFilesize
5.8MB
-
memory/1720-31-0x0000000000ED0000-0x00000000014A5000-memory.dmpFilesize
5.8MB
-
memory/1720-32-0x0000000000ED0000-0x00000000014A5000-memory.dmpFilesize
5.8MB