Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 15:19
Behavioral task
behavioral1
Sample
57b413b133af90b7985933d115cc6dd4e0a845d03bd36354d72eaeac711a5984.exe
Resource
win7-20240611-en
windows7-x64
6 signatures
150 seconds
General
-
Target
57b413b133af90b7985933d115cc6dd4e0a845d03bd36354d72eaeac711a5984.exe
-
Size
12.2MB
-
MD5
5e0bd1b48d5e9543e129dbe072c10ab3
-
SHA1
f733e4b012c81f082959c9f240298d3286c583b1
-
SHA256
57b413b133af90b7985933d115cc6dd4e0a845d03bd36354d72eaeac711a5984
-
SHA512
6b7fb9a88bfb0a48a68cbd6d3ff8180f7be637ebc0da30840d39c5cfc9eb086350c8546128b983265289e39464e0ca109795179cf6c63ff9acef72841a618095
-
SSDEEP
393216:3xJqA8Zr+FaMwdgA97sDr8VPM13Gdo5r:398ZKJigAnMJGd
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 57b413b133af90b7985933d115cc6dd4e0a845d03bd36354d72eaeac711a5984.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 57b413b133af90b7985933d115cc6dd4e0a845d03bd36354d72eaeac711a5984.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 57b413b133af90b7985933d115cc6dd4e0a845d03bd36354d72eaeac711a5984.exe -
resource yara_rule behavioral1/memory/1044-17-0x0000000000050000-0x00000000021D4000-memory.dmp themida behavioral1/memory/1044-18-0x0000000000050000-0x00000000021D4000-memory.dmp themida behavioral1/memory/1044-27-0x0000000000050000-0x00000000021D4000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 57b413b133af90b7985933d115cc6dd4e0a845d03bd36354d72eaeac711a5984.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1044 57b413b133af90b7985933d115cc6dd4e0a845d03bd36354d72eaeac711a5984.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1044 57b413b133af90b7985933d115cc6dd4e0a845d03bd36354d72eaeac711a5984.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57b413b133af90b7985933d115cc6dd4e0a845d03bd36354d72eaeac711a5984.exe"C:\Users\Admin\AppData\Local\Temp\57b413b133af90b7985933d115cc6dd4e0a845d03bd36354d72eaeac711a5984.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1044