Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 12:35
Behavioral task
behavioral1
Sample
VastGen.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
VastGen.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
crack.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
crack.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
data/usernames.vbs
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
data/usernames.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
loader.exe
Resource
win7-20240221-en
General
-
Target
loader.exe
-
Size
8.5MB
-
MD5
851dc1231b62cca3b63f7f2287dff84f
-
SHA1
16915a97ff71586cb033319a3f81c18d8792e1b7
-
SHA256
2019edf4b004995ed0cc16da5a8746a6154b16df7663cbe6d3fc7782ba5dbc17
-
SHA512
507c6038f9b65ccb74fe6947ac9caeeef35dcc1b0d01fd68e10a7d2cc5cf6997bdd04cb10b1cc25fd2966b266c7ff471f91618da6021ef4cd0ba24803c7482f9
-
SSDEEP
196608:lWU/XIK3djYTPtJyCAaws5WJqHqJLkSXNzeHrldm:lWU/4kU7tJy7DhJQyNSLl4
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ loader.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion loader.exe -
Executes dropped EXE 1 IoCs
pid Process 2444 loader.exe -
Loads dropped DLL 2 IoCs
pid Process 1624 loader.exe 2444 loader.exe -
resource yara_rule behavioral7/memory/1624-0-0x000000013F110000-0x000000013FF63000-memory.dmp themida behavioral7/memory/1624-2-0x000000013F110000-0x000000013FF63000-memory.dmp themida behavioral7/memory/1624-4-0x000000013F110000-0x000000013FF63000-memory.dmp themida behavioral7/memory/1624-5-0x000000013F110000-0x000000013FF63000-memory.dmp themida behavioral7/memory/1624-6-0x000000013F110000-0x000000013FF63000-memory.dmp themida behavioral7/memory/1624-3-0x000000013F110000-0x000000013FF63000-memory.dmp themida behavioral7/memory/1624-1-0x000000013F110000-0x000000013FF63000-memory.dmp themida behavioral7/memory/1624-112-0x000000013F110000-0x000000013FF63000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA loader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2444 1624 loader.exe 29 PID 1624 wrote to memory of 2444 1624 loader.exe 29 PID 1624 wrote to memory of 2444 1624 loader.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\onefile_1624_133616326042186000\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD59a24c8c35e4ac4b1597124c1dcbebe0f
SHA1f59782a4923a30118b97e01a7f8db69b92d8382a
SHA256a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7
SHA5129d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b
-
Filesize
8.5MB
MD549c7d8a33d1b2ff955d0730e84e8cd6c
SHA1f1429fbe357102901cab5ba7d20673fb0fb7db6b
SHA256ee42078cbd223280c0427036e5ae79ddfbe7dc2c7f4b5f7ea778bf12a5867fb1
SHA5127b7fd45336ae246e488fd4b989e8bc4f40d8ee621cf75bcc722f7d6cde0556dddc8cc3b0375593d4e50d4566cbeb3f011c0865fef38d203cb0e1e9f20ee7be4f