Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20/06/2024, 22:53

General

  • Target

    32c80831029de1be9c3f23027703e9a0a674a50bcf7d35d8ad074b1eaac4dca9.exe

  • Size

    2.3MB

  • MD5

    a39373bdf1cf3af85e466d678c82db47

  • SHA1

    97e2512f7e1a606e1d7652bd6756f6c4ad5b2152

  • SHA256

    32c80831029de1be9c3f23027703e9a0a674a50bcf7d35d8ad074b1eaac4dca9

  • SHA512

    7ca9617835186390e56e0562ffeb55546ab68d0129ece6ca31a4722249940e71cbd8710719c1601ab3bd3cd1bfcefd93944a791ed34eeeccf1a07f9da9c5682f

  • SSDEEP

    24576:JHC6VHCNyo0ujHP8fOu77oPjfnf9w37fYveAwpH8wkA6hMQJjCF1EdSRbC8Pfb7u:JENFs77oPjPf9IrVpH87tajbFhfDP

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32c80831029de1be9c3f23027703e9a0a674a50bcf7d35d8ad074b1eaac4dca9.exe
    "C:\Users\Admin\AppData\Local\Temp\32c80831029de1be9c3f23027703e9a0a674a50bcf7d35d8ad074b1eaac4dca9.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:5044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5044-0-0x0000000000FA0000-0x00000000015A0000-memory.dmp

    Filesize

    6.0MB

  • memory/5044-1-0x0000000077106000-0x0000000077108000-memory.dmp

    Filesize

    8KB

  • memory/5044-2-0x0000000000FA1000-0x000000000104D000-memory.dmp

    Filesize

    688KB

  • memory/5044-3-0x0000000000FA0000-0x00000000015A0000-memory.dmp

    Filesize

    6.0MB

  • memory/5044-4-0x0000000000FA0000-0x00000000015A0000-memory.dmp

    Filesize

    6.0MB

  • memory/5044-5-0x0000000000FA0000-0x00000000015A0000-memory.dmp

    Filesize

    6.0MB

  • memory/5044-6-0x0000000000FA0000-0x00000000015A0000-memory.dmp

    Filesize

    6.0MB

  • memory/5044-7-0x0000000000FA0000-0x00000000015A0000-memory.dmp

    Filesize

    6.0MB

  • memory/5044-8-0x0000000000FA0000-0x00000000015A0000-memory.dmp

    Filesize

    6.0MB

  • memory/5044-9-0x0000000000FA0000-0x00000000015A0000-memory.dmp

    Filesize

    6.0MB

  • memory/5044-10-0x0000000000FA0000-0x00000000015A0000-memory.dmp

    Filesize

    6.0MB

  • memory/5044-11-0x0000000000FA0000-0x00000000015A0000-memory.dmp

    Filesize

    6.0MB

  • memory/5044-12-0x0000000000FA0000-0x00000000015A0000-memory.dmp

    Filesize

    6.0MB

  • memory/5044-13-0x0000000000FA0000-0x00000000015A0000-memory.dmp

    Filesize

    6.0MB

  • memory/5044-14-0x0000000000FA0000-0x00000000015A0000-memory.dmp

    Filesize

    6.0MB

  • memory/5044-15-0x0000000000FA0000-0x00000000015A0000-memory.dmp

    Filesize

    6.0MB

  • memory/5044-16-0x0000000000FA0000-0x00000000015A0000-memory.dmp

    Filesize

    6.0MB

  • memory/5044-17-0x0000000000FA0000-0x00000000015A0000-memory.dmp

    Filesize

    6.0MB

  • memory/5044-18-0x0000000000FA0000-0x00000000015A0000-memory.dmp

    Filesize

    6.0MB

  • memory/5044-19-0x0000000000FA0000-0x00000000015A0000-memory.dmp

    Filesize

    6.0MB

  • memory/5044-20-0x0000000000FA0000-0x00000000015A0000-memory.dmp

    Filesize

    6.0MB

  • memory/5044-21-0x0000000000FA0000-0x00000000015A0000-memory.dmp

    Filesize

    6.0MB