Analysis Overview
SHA256
39cd18904b3a591ad4c70f648e2fb5306eaa634fd6f80bebc2502203226278c8
Threat Level: Known bad
The file 39cd18904b3a591ad4c70f648e2fb5306eaa634fd6f80bebc2502203226278c8 was found to be: Known bad.
Malicious Activity Summary
RisePro
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Checks BIOS information in registry
Identifies Wine through registry keys
Suspicious use of NtSetInformationThreadHideFromDebugger
Unsigned PE
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-09 23:30
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-09 23:30
Reported
2024-06-09 23:37
Platform
win10v2004-20240508-en
Max time kernel
140s
Max time network
161s
Command Line
Signatures
RisePro
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\39cd18904b3a591ad4c70f648e2fb5306eaa634fd6f80bebc2502203226278c8.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\39cd18904b3a591ad4c70f648e2fb5306eaa634fd6f80bebc2502203226278c8.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\39cd18904b3a591ad4c70f648e2fb5306eaa634fd6f80bebc2502203226278c8.exe | N/A |
Identifies Wine through registry keys
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\39cd18904b3a591ad4c70f648e2fb5306eaa634fd6f80bebc2502203226278c8.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\39cd18904b3a591ad4c70f648e2fb5306eaa634fd6f80bebc2502203226278c8.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\39cd18904b3a591ad4c70f648e2fb5306eaa634fd6f80bebc2502203226278c8.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\39cd18904b3a591ad4c70f648e2fb5306eaa634fd6f80bebc2502203226278c8.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\39cd18904b3a591ad4c70f648e2fb5306eaa634fd6f80bebc2502203226278c8.exe
"C:\Users\Admin\AppData\Local\Temp\39cd18904b3a591ad4c70f648e2fb5306eaa634fd6f80bebc2502203226278c8.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 101.58.20.217.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 23.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
Files
memory/4524-0-0x00000000009A0000-0x0000000000FA0000-memory.dmp
memory/4524-1-0x0000000077B44000-0x0000000077B46000-memory.dmp
memory/4524-2-0x00000000009A1000-0x0000000000A4D000-memory.dmp
memory/4524-3-0x00000000009A0000-0x0000000000FA0000-memory.dmp
memory/4524-4-0x00000000009A0000-0x0000000000FA0000-memory.dmp
memory/4524-5-0x00000000009A0000-0x0000000000FA0000-memory.dmp
memory/4524-6-0x00000000009A0000-0x0000000000FA0000-memory.dmp
memory/4524-7-0x00000000009A0000-0x0000000000FA0000-memory.dmp
memory/4524-8-0x00000000009A0000-0x0000000000FA0000-memory.dmp
memory/4524-9-0x00000000009A0000-0x0000000000FA0000-memory.dmp
memory/4524-10-0x00000000009A0000-0x0000000000FA0000-memory.dmp
memory/4524-11-0x00000000009A0000-0x0000000000FA0000-memory.dmp
memory/4524-12-0x00000000009A0000-0x0000000000FA0000-memory.dmp
memory/4524-13-0x00000000009A0000-0x0000000000FA0000-memory.dmp
memory/4524-14-0x00000000009A0000-0x0000000000FA0000-memory.dmp
memory/4524-15-0x00000000009A0000-0x0000000000FA0000-memory.dmp
memory/4524-16-0x00000000009A0000-0x0000000000FA0000-memory.dmp
memory/4524-17-0x00000000009A0000-0x0000000000FA0000-memory.dmp
memory/4524-18-0x00000000009A0000-0x0000000000FA0000-memory.dmp
memory/4524-19-0x00000000009A0000-0x0000000000FA0000-memory.dmp
memory/4524-20-0x00000000009A0000-0x0000000000FA0000-memory.dmp
memory/4524-21-0x00000000009A0000-0x0000000000FA0000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-09 23:30
Reported
2024-06-09 23:35
Platform
win11-20240419-en
Max time kernel
140s
Max time network
99s
Command Line
Signatures
RisePro
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\39cd18904b3a591ad4c70f648e2fb5306eaa634fd6f80bebc2502203226278c8.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\39cd18904b3a591ad4c70f648e2fb5306eaa634fd6f80bebc2502203226278c8.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\39cd18904b3a591ad4c70f648e2fb5306eaa634fd6f80bebc2502203226278c8.exe | N/A |
Identifies Wine through registry keys
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\39cd18904b3a591ad4c70f648e2fb5306eaa634fd6f80bebc2502203226278c8.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\39cd18904b3a591ad4c70f648e2fb5306eaa634fd6f80bebc2502203226278c8.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\39cd18904b3a591ad4c70f648e2fb5306eaa634fd6f80bebc2502203226278c8.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\39cd18904b3a591ad4c70f648e2fb5306eaa634fd6f80bebc2502203226278c8.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\39cd18904b3a591ad4c70f648e2fb5306eaa634fd6f80bebc2502203226278c8.exe
"C:\Users\Admin\AppData\Local\Temp\39cd18904b3a591ad4c70f648e2fb5306eaa634fd6f80bebc2502203226278c8.exe"
Network
Files
memory/4800-0-0x0000000000480000-0x0000000000A80000-memory.dmp
memory/4800-1-0x0000000077E36000-0x0000000077E38000-memory.dmp
memory/4800-2-0x0000000000481000-0x000000000052D000-memory.dmp
memory/4800-3-0x0000000000480000-0x0000000000A80000-memory.dmp
memory/4800-4-0x0000000000480000-0x0000000000A80000-memory.dmp
memory/4800-5-0x0000000000480000-0x0000000000A80000-memory.dmp
memory/4800-6-0x0000000000480000-0x0000000000A80000-memory.dmp
memory/4800-7-0x0000000000480000-0x0000000000A80000-memory.dmp
memory/4800-8-0x0000000000480000-0x0000000000A80000-memory.dmp
memory/4800-9-0x0000000000480000-0x0000000000A80000-memory.dmp
memory/4800-10-0x0000000000480000-0x0000000000A80000-memory.dmp
memory/4800-11-0x0000000000480000-0x0000000000A80000-memory.dmp
memory/4800-12-0x0000000000480000-0x0000000000A80000-memory.dmp
memory/4800-13-0x0000000000480000-0x0000000000A80000-memory.dmp
memory/4800-14-0x0000000000480000-0x0000000000A80000-memory.dmp
memory/4800-15-0x0000000000480000-0x0000000000A80000-memory.dmp
memory/4800-16-0x0000000000480000-0x0000000000A80000-memory.dmp
memory/4800-17-0x0000000000480000-0x0000000000A80000-memory.dmp
memory/4800-18-0x0000000000480000-0x0000000000A80000-memory.dmp
memory/4800-19-0x0000000000480000-0x0000000000A80000-memory.dmp
memory/4800-20-0x0000000000480000-0x0000000000A80000-memory.dmp
memory/4800-21-0x0000000000480000-0x0000000000A80000-memory.dmp