General
-
Target
Apple.exe
-
Size
231KB
-
Sample
240720-1gs9vaxbpa
-
MD5
2340b8a2bd837a5cff9b309477e482f7
-
SHA1
9388ce8dd1e17e680e6ccf130e5a07beb06d0df8
-
SHA256
5e1d6c967328d7b5c61028616420b13c83c3609bdc7667f75bbd923118dca19e
-
SHA512
f44d430b857a52e39ba9b3d0c831dcf74663351046e472b8c265421e3d05ea14870776a18651658eaa509ccdae8ead2cadce6a54cbf14e625d844d7a933a8259
-
SSDEEP
3072:wYwfMXIzqQWIY1LgWqoMcwBpdIi6MTBsOzu7m2N943SVMG34DmfGGEbt4m2b3cTd:6fMXIe/14ogFIk3LFCa7k
Static task
static1
Behavioral task
behavioral1
Sample
Apple.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
Apple.exe
-
Size
231KB
-
MD5
2340b8a2bd837a5cff9b309477e482f7
-
SHA1
9388ce8dd1e17e680e6ccf130e5a07beb06d0df8
-
SHA256
5e1d6c967328d7b5c61028616420b13c83c3609bdc7667f75bbd923118dca19e
-
SHA512
f44d430b857a52e39ba9b3d0c831dcf74663351046e472b8c265421e3d05ea14870776a18651658eaa509ccdae8ead2cadce6a54cbf14e625d844d7a933a8259
-
SSDEEP
3072:wYwfMXIzqQWIY1LgWqoMcwBpdIi6MTBsOzu7m2N943SVMG34DmfGGEbt4m2b3cTd:6fMXIe/14ogFIk3LFCa7k
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Executes dropped EXE
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Virtualization/Sandbox Evasion
1