Analysis

  • max time kernel
    92s
  • max time network
    214s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    05/06/2024, 08:39

General

  • Target

    PresidioAgent.exe

  • Size

    3.3MB

  • MD5

    fe31ef09276e40062e6f4e1c698d28e0

  • SHA1

    953032e2caa5d1393299505f2241e851044eeb9c

  • SHA256

    2cdc3db79aed0c4e3fa10d57e36dd5c374ac4a647025c4c9cc9231d3b9ba9542

  • SHA512

    e86365e7a1350f2de16217f7e37cf336572079b2651977fb01b4916176a7c32ee9e7beea65384e3b1772016a576fd774361bd9c2d811c3b66771e1b39a20dbec

  • SSDEEP

    98304:6q7H5Y3o15+7xjBFoq1+XFpHR06M7VQ8CpiM:LaoTUx/oq1+nHR06cCpiM

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PresidioAgent.exe
    "C:\Users\Admin\AppData\Local\Temp\PresidioAgent.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtCreateThreadExHideFromDebugger
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:124

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/124-0-0x00007FFE16D07000-0x00007FFE16D09000-memory.dmp

          Filesize

          8KB