Resubmissions
09/07/2024, 08:36
240709-khtzrsvekr 9Analysis
-
max time kernel
94s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 08:36
Behavioral task
behavioral1
Sample
torch.exe
Resource
win7-20240704-en
7 signatures
150 seconds
General
-
Target
torch.exe
-
Size
5.5MB
-
MD5
5d1f10102ca98c98ac0352a8244237ab
-
SHA1
21de5ffa181eeae75241423678832161ff68933d
-
SHA256
7fb4e62ce28df2d528cd19e4a80172cdbb34624adf6f22b842b474058354123b
-
SHA512
c741a22dba08d52f89fc0c1fe0e70a24cd3b0e0282f2c4235186c076e1318455d3b5af606a8e013b28cf2221e3cbf56ee232d9e0479ca74d42be6efc17368618
-
SSDEEP
98304:o5ef9U+zqEEMJWhF6lq5kH1g6luY5SKrjr80eTevApSpkc42L4LgnfOs0S7Qtx:oOrz1EMYF60KruYXrjr8/eTpVr2s0S7g
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ torch.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion torch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion torch.exe -
resource yara_rule behavioral2/memory/4956-0-0x0000000140000000-0x0000000140DA6000-memory.dmp themida behavioral2/memory/4956-2-0x0000000140000000-0x0000000140DA6000-memory.dmp themida behavioral2/memory/4956-1-0x0000000140000000-0x0000000140DA6000-memory.dmp themida behavioral2/memory/4956-3-0x0000000140000000-0x0000000140DA6000-memory.dmp themida behavioral2/memory/4956-21-0x0000000140000000-0x0000000140DA6000-memory.dmp themida behavioral2/memory/4956-27-0x0000000140000000-0x0000000140DA6000-memory.dmp themida behavioral2/memory/4956-31-0x0000000140000000-0x0000000140DA6000-memory.dmp themida behavioral2/memory/4956-38-0x0000000140000000-0x0000000140DA6000-memory.dmp themida behavioral2/memory/4956-44-0x0000000140000000-0x0000000140DA6000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA torch.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4956 torch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe 4956 torch.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4956 wrote to memory of 1820 4956 torch.exe 86 PID 4956 wrote to memory of 1820 4956 torch.exe 86 PID 1820 wrote to memory of 2028 1820 cmd.exe 87 PID 1820 wrote to memory of 2028 1820 cmd.exe 87 PID 1820 wrote to memory of 2996 1820 cmd.exe 88 PID 1820 wrote to memory of 2996 1820 cmd.exe 88 PID 1820 wrote to memory of 2408 1820 cmd.exe 89 PID 1820 wrote to memory of 2408 1820 cmd.exe 89 PID 4956 wrote to memory of 1392 4956 torch.exe 90 PID 4956 wrote to memory of 1392 4956 torch.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\torch.exe"C:\Users\Admin\AppData\Local\Temp\torch.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\torch.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\torch.exe" MD53⤵PID:2028
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2996
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2408
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1392
-