Analysis Overview
SHA256
d693c6a6b3eef397023f5d6dd0d59222c4d97aedbf313ef2769d5f7010cd5e7a
Threat Level: Likely malicious
The file clx2bekuz02rp4pgehjad1i9m.exe was found to be: Likely malicious.
Malicious Activity Summary
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Checks BIOS information in registry
Themida packer
Checks computer location settings
Checks whether UAC is enabled
Suspicious use of NtSetInformationThreadHideFromDebugger
Enumerates physical storage devices
Unsigned PE
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-10 03:55
Signatures
Themida packer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-10 03:54
Reported
2024-06-10 03:57
Platform
win7-20240508-en
Max time kernel
121s
Max time network
122s
Command Line
Signatures
Themida packer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\clx2bekuz02rp4pgehjad1i9m.exe
"C:\Users\Admin\AppData\Local\Temp\clx2bekuz02rp4pgehjad1i9m.exe"
Network
Files
memory/2132-1-0x000000013FE10000-0x0000000140FC5000-memory.dmp
memory/2132-0-0x000000013FE10000-0x0000000140FC5000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-10 03:54
Reported
2024-06-10 03:57
Platform
win10v2004-20240508-en
Max time kernel
96s
Max time network
97s
Command Line
Signatures
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\clx2bekuz02rp4pgehjad1i9m.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\clx2bekuz02rp4pgehjad1i9m.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\clx2bekuz02rp4pgehjad1i9m.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\clx2bekuz02rp4pgehjad1i9m.exe | N/A |
Themida packer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA | C:\Users\Admin\AppData\Local\Temp\clx2bekuz02rp4pgehjad1i9m.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\clx2bekuz02rp4pgehjad1i9m.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\clx2bekuz02rp4pgehjad1i9m.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\clx2bekuz02rp4pgehjad1i9m.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\clx2bekuz02rp4pgehjad1i9m.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\clx2bekuz02rp4pgehjad1i9m.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\clx2bekuz02rp4pgehjad1i9m.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\clx2bekuz02rp4pgehjad1i9m.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\clx2bekuz02rp4pgehjad1i9m.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\clx2bekuz02rp4pgehjad1i9m.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4548 wrote to memory of 1172 | N/A | C:\Users\Admin\AppData\Local\Temp\clx2bekuz02rp4pgehjad1i9m.exe | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
| PID 4548 wrote to memory of 1172 | N/A | C:\Users\Admin\AppData\Local\Temp\clx2bekuz02rp4pgehjad1i9m.exe | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\clx2bekuz02rp4pgehjad1i9m.exe
"C:\Users\Admin\AppData\Local\Temp\clx2bekuz02rp4pgehjad1i9m.exe"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /C Get-Service -Name WpnUserService* | Restart-Service -Force
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | venomcheats.net | udp |
| US | 104.26.14.39:443 | venomcheats.net | tcp |
| US | 8.8.8.8:53 | x2.c.lencr.org | udp |
| BE | 23.55.97.11:80 | x2.c.lencr.org | tcp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 39.14.26.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.97.55.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 71.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 203.107.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
Files
memory/4548-0-0x00007FF6F8DF0000-0x00007FF6F9FA5000-memory.dmp
memory/4548-1-0x00007FFDF2EB0000-0x00007FFDF2EB2000-memory.dmp
memory/4548-2-0x00007FF6F8DF0000-0x00007FF6F9FA5000-memory.dmp
memory/4548-3-0x00007FF6F8DF0000-0x00007FF6F9FA5000-memory.dmp
memory/4548-4-0x00007FF6F8DF0000-0x00007FF6F9FA5000-memory.dmp
memory/4548-5-0x00007FF6F8DF0000-0x00007FF6F9FA5000-memory.dmp
memory/4548-6-0x00007FF6F8DF0000-0x00007FF6F9FA5000-memory.dmp
memory/4548-8-0x00007FF6F8DF0000-0x00007FF6F9FA5000-memory.dmp
memory/4548-7-0x00007FF6F8DF0000-0x00007FF6F9FA5000-memory.dmp
memory/4548-9-0x00007FF6F8DF0000-0x00007FF6F9FA5000-memory.dmp
memory/1172-18-0x00007FFDF2E10000-0x00007FFDF3005000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lngrkkf4.ifn.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/1172-19-0x0000017A768C0000-0x0000017A768E2000-memory.dmp
memory/1172-17-0x00007FFDF2E10000-0x00007FFDF3005000-memory.dmp
memory/1172-16-0x00007FFDF2E10000-0x00007FFDF3005000-memory.dmp
memory/1172-29-0x00007FFDF2E10000-0x00007FFDF3005000-memory.dmp
memory/1172-32-0x00007FFDF2E10000-0x00007FFDF3005000-memory.dmp
memory/4548-33-0x00000188C98F0000-0x00000188C98F1000-memory.dmp
memory/4548-35-0x00007FFDF2E10000-0x00007FFDF3005000-memory.dmp
memory/4548-34-0x00007FFDF2E10000-0x00007FFDF3005000-memory.dmp
memory/4548-40-0x00007FFDF2E10000-0x00007FFDF3005000-memory.dmp
memory/4548-39-0x00007FF6F8DF0000-0x00007FF6F9FA5000-memory.dmp