Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 03:39
Behavioral task
behavioral1
Sample
573293a771fb2ded85b7d27f796db6bf45862b88a7c4e6526f8b131030676cb6.exe
Resource
win7-20240508-en
9 signatures
150 seconds
General
-
Target
573293a771fb2ded85b7d27f796db6bf45862b88a7c4e6526f8b131030676cb6.exe
-
Size
5.5MB
-
MD5
51fbd042816fb8f5cad1857e13d4d5ea
-
SHA1
6e13181bd860a48896935852ff019a1965873813
-
SHA256
573293a771fb2ded85b7d27f796db6bf45862b88a7c4e6526f8b131030676cb6
-
SHA512
97a0907b6bf269e85041e6af793973774b46cc5663cc7a02f08b2d78caec757d4dea87c08e6b8ab29386c64ff725eadccb69cd26f2e09a59d5a3c4acd6010fec
-
SSDEEP
98304:HHwP7+3YEWT9cPqfghfAjtXkS9z3G+InAVO/aXNbb7m/YvxeHUTEK9Dz:HHwP7yOT9cP6OfitXkSN3Pg9ydvCYZ+q
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 573293a771fb2ded85b7d27f796db6bf45862b88a7c4e6526f8b131030676cb6.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 573293a771fb2ded85b7d27f796db6bf45862b88a7c4e6526f8b131030676cb6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 573293a771fb2ded85b7d27f796db6bf45862b88a7c4e6526f8b131030676cb6.exe -
resource yara_rule behavioral2/memory/2620-21-0x00000000008D0000-0x00000000014A0000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 573293a771fb2ded85b7d27f796db6bf45862b88a7c4e6526f8b131030676cb6.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2620 573293a771fb2ded85b7d27f796db6bf45862b88a7c4e6526f8b131030676cb6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2620 wrote to memory of 5016 2620 573293a771fb2ded85b7d27f796db6bf45862b88a7c4e6526f8b131030676cb6.exe 91 PID 2620 wrote to memory of 5016 2620 573293a771fb2ded85b7d27f796db6bf45862b88a7c4e6526f8b131030676cb6.exe 91 PID 2620 wrote to memory of 5972 2620 573293a771fb2ded85b7d27f796db6bf45862b88a7c4e6526f8b131030676cb6.exe 97 PID 2620 wrote to memory of 5972 2620 573293a771fb2ded85b7d27f796db6bf45862b88a7c4e6526f8b131030676cb6.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\573293a771fb2ded85b7d27f796db6bf45862b88a7c4e6526f8b131030676cb6.exe"C:\Users\Admin\AppData\Local\Temp\573293a771fb2ded85b7d27f796db6bf45862b88a7c4e6526f8b131030676cb6.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=573293a771fb2ded85b7d27f796db6bf45862b88a7c4e6526f8b131030676cb6.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=573293a771fb2ded85b7d27f796db6bf45862b88a7c4e6526f8b131030676cb6.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵PID:5972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=3924 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:11⤵PID:5604
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=5136 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:11⤵PID:5584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4984 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:5428
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5752 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:11⤵PID:4532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=5264 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:11⤵PID:4544
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --mojo-platform-channel-handle=3728 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:11⤵PID:5992
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3864 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:3592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --mojo-platform-channel-handle=5588 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:11⤵PID:5828
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=5436 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:2692