Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
06-06-2024 09:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Stealth.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
Stealth.exe
-
Size
9.3MB
-
MD5
4e50213716582b292e7f0facfa21e662
-
SHA1
d2b59642f77801279d88f6c8341894cd82582e21
-
SHA256
d67d83dc5b43e45d377b44c1f96b219d5ac349886734b059b2854b74e1e8f454
-
SHA512
a4cca7dfda4fa0e876fddbcfd1d9f9ec9158cdd176b0e87eb12acd8f86ff7782477efb894d879d96b36b71a6e1efe590fccecab1e62f04d4bb97db3e0e71b3cd
-
SSDEEP
196608:ZyBDKZCUCKWn9vzrwBNf3PNlTjAGE1ZP8QGpgt1y7zD40MVYL43IAO1:GDK8pKG1zY/TUHEQGpw1iw0E9O1
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Stealth.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Stealth.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Stealth.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Stealth.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1632 Stealth.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1272 1632 Stealth.exe 29 PID 1632 wrote to memory of 1272 1632 Stealth.exe 29 PID 1632 wrote to memory of 1272 1632 Stealth.exe 29 PID 1272 wrote to memory of 3028 1272 cmd.exe 30 PID 1272 wrote to memory of 3028 1272 cmd.exe 30 PID 1272 wrote to memory of 3028 1272 cmd.exe 30 PID 1272 wrote to memory of 3060 1272 cmd.exe 31 PID 1272 wrote to memory of 3060 1272 cmd.exe 31 PID 1272 wrote to memory of 3060 1272 cmd.exe 31 PID 1272 wrote to memory of 1088 1272 cmd.exe 32 PID 1272 wrote to memory of 1088 1272 cmd.exe 32 PID 1272 wrote to memory of 1088 1272 cmd.exe 32 PID 1632 wrote to memory of 3004 1632 Stealth.exe 33 PID 1632 wrote to memory of 3004 1632 Stealth.exe 33 PID 1632 wrote to memory of 3004 1632 Stealth.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Stealth.exe"C:\Users\Admin\AppData\Local\Temp\Stealth.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Stealth.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Stealth.exe" MD53⤵PID:3028
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:3060
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:1088
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3004
-