Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 18:05
Static task
static1
Behavioral task
behavioral1
Sample
864d1a4e41a56c8f2e7e7eec89a47638.exe
Resource
win7-20240611-en
General
-
Target
864d1a4e41a56c8f2e7e7eec89a47638.exe
-
Size
3.6MB
-
MD5
864d1a4e41a56c8f2e7e7eec89a47638
-
SHA1
1f2cb906b92a945c7346c7139c7722230005c394
-
SHA256
1c733ad7ed4f89826d675196abcc3a6133bb8f67c69d56e5fcb601ad521ff9f8
-
SHA512
547a441369636e2548c7f8f94c3972269e04d80ee5a26803cc222942b28e457be908126fb4ff6bfde2a063ea1ef74ecba2aaceb58c68fba5c4fddcea5fbd91d3
-
SSDEEP
98304:nroESehXGx5IkVu1f/ihp+t49Rd3iG2dEsL:s3ehXzgiSvGiv3tEj
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ da_protected.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion da_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion da_protected.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 864d1a4e41a56c8f2e7e7eec89a47638.exe -
Executes dropped EXE 1 IoCs
pid Process 3960 da_protected.exe -
resource yara_rule behavioral2/files/0x0007000000023278-4.dat themida behavioral2/memory/3960-22-0x0000000000690000-0x0000000000FE8000-memory.dmp themida behavioral2/memory/3960-23-0x0000000000690000-0x0000000000FE8000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA da_protected.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3960 da_protected.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3960 da_protected.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4440 wrote to memory of 3960 4440 864d1a4e41a56c8f2e7e7eec89a47638.exe 83 PID 4440 wrote to memory of 3960 4440 864d1a4e41a56c8f2e7e7eec89a47638.exe 83 PID 4440 wrote to memory of 3960 4440 864d1a4e41a56c8f2e7e7eec89a47638.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\864d1a4e41a56c8f2e7e7eec89a47638.exe"C:\Users\Admin\AppData\Local\Temp\864d1a4e41a56c8f2e7e7eec89a47638.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\da_protected.exe"C:\Users\Admin\AppData\Local\Temp\da_protected.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD53d21c714fbb98a6a3c72919928c9525c
SHA1bf628293920b8f0418de008acc8f3506eaeff3cb
SHA256811be420db2f390e60a291018126a8aa45c8c5182c050b13076c80d3f80d153c
SHA5123b21fda899cf197a740dd4f2844c99c772a16ffe20581fe78e801c193f29714fbfa23843059ee34baf6176e71434f0ed7506d75de91b87348bcf9cc4b999575a