Analysis
-
max time kernel
276s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 14:59
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Loader.exe
Resource
win10v2004-20240802-en
General
-
Target
Loader.exe
-
Size
13.3MB
-
MD5
d3567c93fb7a218ad130542ac8b02a76
-
SHA1
e0f2e65b0eab58da6c26de403933ed6e22c0c364
-
SHA256
7f19b0c0bc1ce4ce7b0bd072527f2feade5809d8de040c01945737534502a4de
-
SHA512
a245ff8e8e6843298159ae207866df7f840865f02ac7c813faa9b7a5b1740b2b9bde496e98dc413f12597e96c5c8c62fde4845a774d904eb089070d80498be04
-
SSDEEP
196608:YTYz2RUiumFCR0F29+AFB1Au21QUhX2nUMhjIhK/gVCPxWrJerBtZEmla:EYz2RR69+an9WaUioVCPoozZN8
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Loader.exe -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\winhb.sys Loader.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Loader.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Loader.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2869} Loader.exe File opened for modification C:\Windows\System32\IME\IMETC\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2899} Loader.exe File opened for modification C:\Windows\system32\WF.msc mmc.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2444} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3000 Loader.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-UPDATE} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2893} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2892} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1476 sc.exe 2712 sc.exe 2656 sc.exe 2716 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3000 Loader.exe 3000 Loader.exe 3000 Loader.exe 3000 Loader.exe 3000 Loader.exe 3000 Loader.exe 3000 Loader.exe 3000 Loader.exe 3000 Loader.exe 3000 Loader.exe 3000 Loader.exe 3000 Loader.exe 3000 Loader.exe 3000 Loader.exe 3000 Loader.exe 3000 Loader.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: 33 2884 mmc.exe Token: SeIncBasePriorityPrivilege 2884 mmc.exe Token: 33 2884 mmc.exe Token: SeIncBasePriorityPrivilege 2884 mmc.exe Token: 33 2884 mmc.exe Token: SeIncBasePriorityPrivilege 2884 mmc.exe Token: 33 2884 mmc.exe Token: SeIncBasePriorityPrivilege 2884 mmc.exe Token: 33 2884 mmc.exe Token: SeIncBasePriorityPrivilege 2884 mmc.exe Token: 33 2884 mmc.exe Token: SeIncBasePriorityPrivilege 2884 mmc.exe Token: 33 2884 mmc.exe Token: SeIncBasePriorityPrivilege 2884 mmc.exe Token: 33 2884 mmc.exe Token: SeIncBasePriorityPrivilege 2884 mmc.exe Token: 33 2120 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2120 AUDIODG.EXE Token: 33 2120 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2120 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2884 mmc.exe 2884 mmc.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2812 3000 Loader.exe 31 PID 3000 wrote to memory of 2812 3000 Loader.exe 31 PID 3000 wrote to memory of 2812 3000 Loader.exe 31 PID 2812 wrote to memory of 2712 2812 cmd.exe 33 PID 2812 wrote to memory of 2712 2812 cmd.exe 33 PID 2812 wrote to memory of 2712 2812 cmd.exe 33 PID 3000 wrote to memory of 2828 3000 Loader.exe 34 PID 3000 wrote to memory of 2828 3000 Loader.exe 34 PID 3000 wrote to memory of 2828 3000 Loader.exe 34 PID 3000 wrote to memory of 2868 3000 Loader.exe 36 PID 3000 wrote to memory of 2868 3000 Loader.exe 36 PID 3000 wrote to memory of 2868 3000 Loader.exe 36 PID 3000 wrote to memory of 2840 3000 Loader.exe 38 PID 3000 wrote to memory of 2840 3000 Loader.exe 38 PID 3000 wrote to memory of 2840 3000 Loader.exe 38 PID 2828 wrote to memory of 2716 2828 cmd.exe 39 PID 2828 wrote to memory of 2716 2828 cmd.exe 39 PID 2828 wrote to memory of 2716 2828 cmd.exe 39 PID 2840 wrote to memory of 2732 2840 cmd.exe 40 PID 2840 wrote to memory of 2732 2840 cmd.exe 40 PID 2840 wrote to memory of 2732 2840 cmd.exe 40 PID 2840 wrote to memory of 2776 2840 cmd.exe 41 PID 2840 wrote to memory of 2776 2840 cmd.exe 41 PID 2840 wrote to memory of 2776 2840 cmd.exe 41 PID 2868 wrote to memory of 2656 2868 cmd.exe 42 PID 2868 wrote to memory of 2656 2868 cmd.exe 42 PID 2868 wrote to memory of 2656 2868 cmd.exe 42 PID 2840 wrote to memory of 2576 2840 cmd.exe 43 PID 2840 wrote to memory of 2576 2840 cmd.exe 43 PID 2840 wrote to memory of 2576 2840 cmd.exe 43 PID 3000 wrote to memory of 2612 3000 Loader.exe 44 PID 3000 wrote to memory of 2612 3000 Loader.exe 44 PID 3000 wrote to memory of 2612 3000 Loader.exe 44 PID 2612 wrote to memory of 1476 2612 cmd.exe 46 PID 2612 wrote to memory of 1476 2612 cmd.exe 46 PID 2612 wrote to memory of 1476 2612 cmd.exe 46 PID 3000 wrote to memory of 2604 3000 Loader.exe 47 PID 3000 wrote to memory of 2604 3000 Loader.exe 47 PID 3000 wrote to memory of 2604 3000 Loader.exe 47 PID 3000 wrote to memory of 332 3000 Loader.exe 48 PID 3000 wrote to memory of 332 3000 Loader.exe 48 PID 3000 wrote to memory of 332 3000 Loader.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc create windowsproc type=kernel binpath=C:\Windows\System32\drivers\winhb.sys2⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\system32\sc.exesc create windowsproc type=kernel binpath=C:\Windows\System32\drivers\winhb.sys3⤵
- Launches sc.exe
PID:2712
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc create windowsproc type=kernel binpath=C:\Windows\System32\drivers\winhb.sys2⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\system32\sc.exesc create windowsproc type=kernel binpath=C:\Windows\System32\drivers\winhb.sys3⤵
- Launches sc.exe
PID:2716
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc start windowsproc2⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\sc.exesc start windowsproc3⤵
- Launches sc.exe
PID:2656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Loader.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Loader.exe" MD53⤵PID:2732
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2776
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2576
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc start windowsproc2⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\system32\sc.exesc start windowsproc3⤵
- Launches sc.exe
PID:1476
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2604
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:332
-
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\WF.msc"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2884
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1156
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5901⤵
- Suspicious use of AdjustPrivilegeToken
PID:2120