Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29/06/2024, 16:29
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe
Resource
win7-20240508-en
General
-
Target
SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe
-
Size
12.6MB
-
MD5
0fd93d95f5427314c472acf35a741bd8
-
SHA1
82c4a03fc289ff7231a55c781838a07cf2cb3afd
-
SHA256
cb8109d659672303e80f6666d566f8192f3134d3d67048e1a60ff3ace62c66f5
-
SHA512
566a7036ccc924aee8b49b69c031b5e77ca85f4ff643db5c82e0ac9533a1a687c844858ae0de080dc29ecc6d74b95cc0eca50d7ccc8f158104e32d2dd241f518
-
SSDEEP
196608:yL9vGiCff7yl3nCIjvDMjYeVa65nT84FMIZETSwjPePdrQJ/BGOqJ9Au5DYPF:yLdGiCbsSIrDMjPgQETSwvJEOqQYDQ
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe -
Loads dropped DLL 1 IoCs
pid Process 2756 SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe -
resource yara_rule behavioral1/memory/2204-0-0x000000013FFB0000-0x0000000140B9D000-memory.dmp themida behavioral1/memory/2204-6-0x000000013FFB0000-0x0000000140B9D000-memory.dmp themida behavioral1/memory/2204-2-0x000000013FFB0000-0x0000000140B9D000-memory.dmp themida behavioral1/memory/2204-3-0x000000013FFB0000-0x0000000140B9D000-memory.dmp themida behavioral1/memory/2204-4-0x000000013FFB0000-0x0000000140B9D000-memory.dmp themida behavioral1/memory/2204-8-0x000000013FFB0000-0x0000000140B9D000-memory.dmp themida behavioral1/memory/2204-5-0x000000013FFB0000-0x0000000140B9D000-memory.dmp themida behavioral1/memory/2204-7-0x000000013FFB0000-0x0000000140B9D000-memory.dmp themida behavioral1/memory/2756-31-0x000000013FFB0000-0x0000000140B9D000-memory.dmp themida behavioral1/memory/2756-33-0x000000013FFB0000-0x0000000140B9D000-memory.dmp themida behavioral1/memory/2756-36-0x000000013FFB0000-0x0000000140B9D000-memory.dmp themida behavioral1/memory/2756-35-0x000000013FFB0000-0x0000000140B9D000-memory.dmp themida behavioral1/memory/2756-34-0x000000013FFB0000-0x0000000140B9D000-memory.dmp themida behavioral1/memory/2756-37-0x000000013FFB0000-0x0000000140B9D000-memory.dmp themida behavioral1/memory/2756-38-0x000000013FFB0000-0x0000000140B9D000-memory.dmp themida behavioral1/memory/2756-39-0x000000013FFB0000-0x0000000140B9D000-memory.dmp themida behavioral1/memory/2756-44-0x000000013FFB0000-0x0000000140B9D000-memory.dmp themida behavioral1/memory/2204-66-0x000000013FFB0000-0x0000000140B9D000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2204 SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe 2756 SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2756 2204 SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe 29 PID 2204 wrote to memory of 2756 2204 SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe 29 PID 2204 wrote to memory of 2756 2204 SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD55a5dd7cad8028097842b0afef45bfbcf
SHA1e247a2e460687c607253949c52ae2801ff35dc4a
SHA256a811c7516f531f1515d10743ae78004dd627eba0dc2d3bc0d2e033b2722043ce
SHA512e6268e4fad2ce3ef16b68298a57498e16f0262bf3531539ad013a66f72df471569f94c6fcc48154b7c3049a3ad15cbfcbb6345dacb4f4ed7d528c74d589c9858