Analysis

  • max time kernel
    132s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 13:20

General

  • Target

    bfc84cd03846b110793635210d9d98880311cd6090cc13331caee199d0c0d9cc.exe

  • Size

    5.3MB

  • MD5

    3c8ff3a5f2fe2ed835912880c2804387

  • SHA1

    61d79555462661e74c278db5edb9bbd55ff1fe0d

  • SHA256

    bfc84cd03846b110793635210d9d98880311cd6090cc13331caee199d0c0d9cc

  • SHA512

    3ae9950dff52330be11878debb6f5f87c1888a536144023029d9e433ab6c8d8914f2c4889df71e1b2de60840242687a47079edb7e44ff12deeec1e303d79b1c4

  • SSDEEP

    98304:1iuobqH3OBxmpnHSW1cpp4oXgxWbLo/ivS/FexAl/T+ZYpIpoYrE:1ixyxNSu2yoXFpvSaY+pJ

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 3 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfc84cd03846b110793635210d9d98880311cd6090cc13331caee199d0c0d9cc.exe
    "C:\Users\Admin\AppData\Local\Temp\bfc84cd03846b110793635210d9d98880311cd6090cc13331caee199d0c0d9cc.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    PID:4448
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1392,i,1809100026287847100,9768898026582633513,262144 --variations-seed-version --mojo-platform-channel-handle=4024 /prefetch:8
    1⤵
      PID:1532

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Pre-OS Boot

    1
    T1542

    Bootkit

    1
    T1542.003

    Defense Evasion

    Virtualization/Sandbox Evasion

    1
    T1497

    Pre-OS Boot

    1
    T1542

    Bootkit

    1
    T1542.003

    Discovery

    Query Registry

    2
    T1012

    Virtualization/Sandbox Evasion

    1
    T1497

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4448-0-0x0000000000150000-0x0000000000E51000-memory.dmp
      Filesize

      13.0MB

    • memory/4448-1-0x00000000779A4000-0x00000000779A6000-memory.dmp
      Filesize

      8KB

    • memory/4448-5-0x0000000000150000-0x0000000000E51000-memory.dmp
      Filesize

      13.0MB