Analysis Overview
SHA256
304b590ece29244d1d4cda37a73c35e0f3c4629b3c844b89e6ed6d1e1e0b24ab
Threat Level: Known bad
The file 304b590ece29244d1d4cda37a73c35e0f3c4629b3c844b89e6ed6d1e1e0b24ab was found to be: Known bad.
Malicious Activity Summary
RisePro
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Identifies Wine through registry keys
Checks BIOS information in registry
Suspicious use of NtSetInformationThreadHideFromDebugger
Unsigned PE
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-04 01:19
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-04 01:19
Reported
2024-06-04 01:22
Platform
win10v2004-20240508-en
Max time kernel
148s
Max time network
153s
Command Line
Signatures
RisePro
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\304b590ece29244d1d4cda37a73c35e0f3c4629b3c844b89e6ed6d1e1e0b24ab.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\304b590ece29244d1d4cda37a73c35e0f3c4629b3c844b89e6ed6d1e1e0b24ab.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\304b590ece29244d1d4cda37a73c35e0f3c4629b3c844b89e6ed6d1e1e0b24ab.exe | N/A |
Identifies Wine through registry keys
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\304b590ece29244d1d4cda37a73c35e0f3c4629b3c844b89e6ed6d1e1e0b24ab.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\304b590ece29244d1d4cda37a73c35e0f3c4629b3c844b89e6ed6d1e1e0b24ab.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\304b590ece29244d1d4cda37a73c35e0f3c4629b3c844b89e6ed6d1e1e0b24ab.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\304b590ece29244d1d4cda37a73c35e0f3c4629b3c844b89e6ed6d1e1e0b24ab.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\304b590ece29244d1d4cda37a73c35e0f3c4629b3c844b89e6ed6d1e1e0b24ab.exe
"C:\Users\Admin\AppData\Local\Temp\304b590ece29244d1d4cda37a73c35e0f3c4629b3c844b89e6ed6d1e1e0b24ab.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 138.107.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.159.190.20.in-addr.arpa | udp |
| NL | 23.62.61.97:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 24.173.189.20.in-addr.arpa | udp |
Files
memory/5072-0-0x00000000007F0000-0x0000000000DED000-memory.dmp
memory/5072-1-0x0000000077BF4000-0x0000000077BF6000-memory.dmp
memory/5072-2-0x00000000007F1000-0x000000000089D000-memory.dmp
memory/5072-3-0x00000000007F0000-0x0000000000DED000-memory.dmp
memory/5072-4-0x00000000007F0000-0x0000000000DED000-memory.dmp
memory/5072-5-0x00000000007F0000-0x0000000000DED000-memory.dmp
memory/5072-6-0x00000000007F0000-0x0000000000DED000-memory.dmp
memory/5072-7-0x00000000007F0000-0x0000000000DED000-memory.dmp
memory/5072-8-0x00000000007F0000-0x0000000000DED000-memory.dmp
memory/5072-9-0x00000000007F0000-0x0000000000DED000-memory.dmp
memory/5072-10-0x00000000007F0000-0x0000000000DED000-memory.dmp
memory/5072-11-0x00000000007F0000-0x0000000000DED000-memory.dmp
memory/5072-12-0x00000000007F0000-0x0000000000DED000-memory.dmp
memory/5072-13-0x00000000007F0000-0x0000000000DED000-memory.dmp
memory/5072-14-0x00000000007F0000-0x0000000000DED000-memory.dmp
memory/5072-15-0x00000000007F0000-0x0000000000DED000-memory.dmp
memory/5072-16-0x00000000007F0000-0x0000000000DED000-memory.dmp
memory/5072-17-0x00000000007F0000-0x0000000000DED000-memory.dmp
memory/5072-18-0x00000000007F0000-0x0000000000DED000-memory.dmp
memory/5072-19-0x00000000007F0000-0x0000000000DED000-memory.dmp
memory/5072-20-0x00000000007F0000-0x0000000000DED000-memory.dmp
memory/5072-21-0x00000000007F0000-0x0000000000DED000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-04 01:19
Reported
2024-06-04 01:22
Platform
win11-20240426-en
Max time kernel
146s
Max time network
150s
Command Line
Signatures
RisePro
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\304b590ece29244d1d4cda37a73c35e0f3c4629b3c844b89e6ed6d1e1e0b24ab.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\304b590ece29244d1d4cda37a73c35e0f3c4629b3c844b89e6ed6d1e1e0b24ab.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\304b590ece29244d1d4cda37a73c35e0f3c4629b3c844b89e6ed6d1e1e0b24ab.exe | N/A |
Identifies Wine through registry keys
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\304b590ece29244d1d4cda37a73c35e0f3c4629b3c844b89e6ed6d1e1e0b24ab.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\304b590ece29244d1d4cda37a73c35e0f3c4629b3c844b89e6ed6d1e1e0b24ab.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\304b590ece29244d1d4cda37a73c35e0f3c4629b3c844b89e6ed6d1e1e0b24ab.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\304b590ece29244d1d4cda37a73c35e0f3c4629b3c844b89e6ed6d1e1e0b24ab.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\304b590ece29244d1d4cda37a73c35e0f3c4629b3c844b89e6ed6d1e1e0b24ab.exe
"C:\Users\Admin\AppData\Local\Temp\304b590ece29244d1d4cda37a73c35e0f3c4629b3c844b89e6ed6d1e1e0b24ab.exe"
Network
| Country | Destination | Domain | Proto |
| US | 52.111.229.43:443 | tcp | |
| US | 8.8.8.8:53 | 30.243.111.52.in-addr.arpa | udp |
Files
memory/4212-0-0x0000000000150000-0x000000000074D000-memory.dmp
memory/4212-1-0x0000000077076000-0x0000000077078000-memory.dmp
memory/4212-2-0x0000000000151000-0x00000000001FD000-memory.dmp
memory/4212-3-0x0000000000150000-0x000000000074D000-memory.dmp
memory/4212-4-0x0000000000150000-0x000000000074D000-memory.dmp
memory/4212-5-0x0000000000150000-0x000000000074D000-memory.dmp
memory/4212-6-0x0000000000150000-0x000000000074D000-memory.dmp
memory/4212-7-0x0000000000150000-0x000000000074D000-memory.dmp
memory/4212-8-0x0000000000150000-0x000000000074D000-memory.dmp
memory/4212-9-0x0000000000150000-0x000000000074D000-memory.dmp
memory/4212-10-0x0000000000150000-0x000000000074D000-memory.dmp
memory/4212-11-0x0000000000150000-0x000000000074D000-memory.dmp
memory/4212-12-0x0000000000150000-0x000000000074D000-memory.dmp
memory/4212-13-0x0000000000150000-0x000000000074D000-memory.dmp
memory/4212-14-0x0000000000150000-0x000000000074D000-memory.dmp
memory/4212-15-0x0000000000150000-0x000000000074D000-memory.dmp
memory/4212-16-0x0000000000150000-0x000000000074D000-memory.dmp
memory/4212-17-0x0000000000150000-0x000000000074D000-memory.dmp
memory/4212-18-0x0000000000150000-0x000000000074D000-memory.dmp
memory/4212-19-0x0000000000150000-0x000000000074D000-memory.dmp
memory/4212-20-0x0000000000150000-0x000000000074D000-memory.dmp
memory/4212-21-0x0000000000150000-0x000000000074D000-memory.dmp