Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
22-06-2024 13:59
Behavioral task
behavioral1
Sample
boostup_boost_tool_cracked/crack.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
boostup_boost_tool_cracked/loader.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
boostup_boost_tool_cracked/main.exe
Resource
win10v2004-20240508-en
General
-
Target
boostup_boost_tool_cracked/crack.dll
-
Size
5.0MB
-
MD5
48c30bd400f1f2510ff23eddad02d899
-
SHA1
5eaef032b6f61c1c72a4fb5da1d926ec548c26d6
-
SHA256
f887832e7e618a733a81cfd6c8d21099f37a226178ca4b53cddf6d62638bf740
-
SHA512
fbb9dc2df463428b6f4f89ed0291d8e3563670f8bb1f597052abc56a7b0ce70e97ea322c15da7ab6664ae5d4af6c5f56fe2fe7d9730f2832a5ec5667f10141b7
-
SSDEEP
98304:z2opYCYhWA5/l/CpgckBHpcIBxWjw+rqeiixL/+wefdmjLdGGf:zh655xPHpc8xBVYF/+2
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2052-1-0x0000000053AF0000-0x00000000544CF000-memory.dmpFilesize
9.9MB
-
memory/2052-0-0x0000000053AF0000-0x00000000544CF000-memory.dmpFilesize
9.9MB
-
memory/2052-2-0x0000000053AF0000-0x00000000544CF000-memory.dmpFilesize
9.9MB
-
memory/2052-3-0x0000000053AF0000-0x00000000544CF000-memory.dmpFilesize
9.9MB
-
memory/2052-6-0x0000000053AF0000-0x00000000544CF000-memory.dmpFilesize
9.9MB
-
memory/2052-5-0x0000000053AF0000-0x00000000544CF000-memory.dmpFilesize
9.9MB
-
memory/2052-4-0x0000000053AF0000-0x00000000544CF000-memory.dmpFilesize
9.9MB
-
memory/2052-7-0x0000000053AF0000-0x00000000544CF000-memory.dmpFilesize
9.9MB