Analysis
-
max time kernel
149s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 00:30
Behavioral task
behavioral1
Sample
maple/Maple.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
maple/crack.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
maple/loader.exe
Resource
win10v2004-20240709-en
General
-
Target
maple/crack.dll
-
Size
5.0MB
-
MD5
b5b1b26e855eda6268b9a2008e0fce86
-
SHA1
d7925f7de5835e3564b187d8654bb9305ea945fb
-
SHA256
06dec4f9857f7b9a43157756606546d04a0f34c87681c7db9aab9125a43b33a7
-
SHA512
14ad2e93ed5876dd246ce6f32674e994b4f35a5acbb1ac46388bebc682a70ce4eca974fda102c273c71dae3c9bc7b69f965fd636cb2d5c579de9cd23e8b35799
-
SSDEEP
98304:j+YCYfXbb8DckgAEhxWiHF/5DoNZ2qkFVwz7583lfdmjLdGGf:jP8QDDRF/eNsqgiZ
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exepid process 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 3956 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 3956 taskmgr.exe Token: SeSystemProfilePrivilege 3956 taskmgr.exe Token: SeCreateGlobalPrivilege 3956 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe 3956 taskmgr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\maple\crack.dll,#11⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:4760
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3956