Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2024, 15:21 UTC

General

  • Target

    release/main/loader.exe

  • Size

    4.1MB

  • MD5

    9ecdc9ed1bea6c226f92d740d43400b9

  • SHA1

    b5b5066cd4284733d8c3f3d7de3ca6653091ae10

  • SHA256

    60c57f14c2e0e0df0bda16646b21dddceaee0159dafbbb8daba310d4e1b5be6c

  • SHA512

    30bc705a2438288e3647d5adfc6119d751823970972b9c6b39a60384a2b7ac261986026b8d1c0b0ca7ee3d7e95363c97b873fdc5fad4096c903cb4e15bf57e43

  • SSDEEP

    98304:vnUGAC+hqc8lqvdzw2nsNKYYURyc9JirsN4JzmUPj:PTn2qcUzp6UYeJRCxPj

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 10 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\release\main\loader.exe
    "C:\Users\Admin\AppData\Local\Temp\release\main\loader.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\release\main\loader.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2432
      • C:\Windows\system32\certutil.exe
        certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\release\main\loader.exe" MD5
        3⤵
          PID:3104
        • C:\Windows\system32\find.exe
          find /i /v "md5"
          3⤵
            PID:2240
          • C:\Windows\system32\find.exe
            find /i /v "certutil"
            3⤵
              PID:4236

        Network

        • flag-us
          DNS
          8.8.8.8.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          8.8.8.8.in-addr.arpa
          IN PTR
          Response
          8.8.8.8.in-addr.arpa
          IN PTR
          dnsgoogle
        • flag-us
          DNS
          23.177.190.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          23.177.190.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          keyauth.win
          loader.exe
          Remote address:
          8.8.8.8:53
          Request
          keyauth.win
          IN A
          Response
          keyauth.win
          IN A
          104.26.1.5
          keyauth.win
          IN A
          104.26.0.5
          keyauth.win
          IN A
          172.67.72.57
        • flag-us
          POST
          https://keyauth.win/api/1.2/
          loader.exe
          Remote address:
          104.26.1.5:443
          Request
          POST /api/1.2/ HTTP/1.1
          Host: keyauth.win
          Accept: */*
          Content-Length: 112
          Content-Type: application/x-www-form-urlencoded
          Response
          HTTP/1.1 200 OK
          Date: Fri, 02 Aug 2024 15:23:07 GMT
          Content-Type: application/json; charset=UTF-8
          Content-Length: 415
          Connection: keep-alive
          signature: cdf906084fd8861c725d73a848e50865982b1d34a6738b14f6a26da895a0d98c
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9Umk9N%2B9wmxvpanvXGJMD5DzO52z6%2F2BwEdM4OuHCoL2FnkIOkGIFn%2FvpJ2D6e%2BaUb7d6LtVTNz43RtL47rQ6QU9NOYOW7oU8lS8vzlHJU20yOqHJPl%2Fd5zYzacl"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Acknowledge: Credit to VaultCord.com
          X-Powered-By: VaultCord.com
          content-security-policy: upgrade-insecure-requests
          permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
          referrer-policy: strict-origin-when-cross-origin
          strict-transport-security: max-age=31536000; includeSubDomains
          x-content-security-policy: img-src *; media-src * data:;
          x-content-type-options: nosniff
          x-frame-options: DENY
          x-xss-protection: 1; mode=block
          Access-Control-Allow-Headers: *
          Access-Control-Allow-Methods: *
          Access-Control-Allow-Origin: *
          Server: cloudflare
          CF-RAY: 8acf113cbe2a3696-LHR
        • flag-us
          DNS
          5.1.26.104.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          5.1.26.104.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          168.245.100.95.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          168.245.100.95.in-addr.arpa
          IN PTR
          Response
          168.245.100.95.in-addr.arpa
          IN PTR
          a95-100-245-168deploystaticakamaitechnologiescom
        • flag-us
          DNS
          205.47.74.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          205.47.74.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          101.58.20.217.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          101.58.20.217.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          101.58.20.217.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          101.58.20.217.in-addr.arpa
          IN PTR
        • flag-us
          DNS
          19.229.111.52.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          19.229.111.52.in-addr.arpa
          IN PTR
          Response
        • 127.0.0.1:65440
          loader.exe
        • 127.0.0.1:65442
          loader.exe
        • 104.26.1.5:443
          https://keyauth.win/api/1.2/
          tls, http
          loader.exe
          1.5kB
          6.6kB
          12
          10

          HTTP Request

          POST https://keyauth.win/api/1.2/

          HTTP Response

          200
        • 8.8.8.8:53
          8.8.8.8.in-addr.arpa
          dns
          66 B
          90 B
          1
          1

          DNS Request

          8.8.8.8.in-addr.arpa

        • 8.8.8.8:53
          23.177.190.20.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          23.177.190.20.in-addr.arpa

        • 8.8.8.8:53
          keyauth.win
          dns
          loader.exe
          57 B
          105 B
          1
          1

          DNS Request

          keyauth.win

          DNS Response

          104.26.1.5
          104.26.0.5
          172.67.72.57

        • 8.8.8.8:53
          5.1.26.104.in-addr.arpa
          dns
          69 B
          131 B
          1
          1

          DNS Request

          5.1.26.104.in-addr.arpa

        • 8.8.8.8:53
          168.245.100.95.in-addr.arpa
          dns
          73 B
          139 B
          1
          1

          DNS Request

          168.245.100.95.in-addr.arpa

        • 8.8.8.8:53
          205.47.74.20.in-addr.arpa
          dns
          71 B
          157 B
          1
          1

          DNS Request

          205.47.74.20.in-addr.arpa

        • 8.8.8.8:53
          101.58.20.217.in-addr.arpa
          dns
          144 B
          132 B
          2
          1

          DNS Request

          101.58.20.217.in-addr.arpa

          DNS Request

          101.58.20.217.in-addr.arpa

        • 8.8.8.8:53
          19.229.111.52.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          19.229.111.52.in-addr.arpa

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1424-0-0x00007FF6D0AF0000-0x00007FF6D158F000-memory.dmp

          Filesize

          10.6MB

        • memory/1424-1-0x00007FF8EEFB0000-0x00007FF8EEFB2000-memory.dmp

          Filesize

          8KB

        • memory/1424-4-0x00007FF6D0AF0000-0x00007FF6D158F000-memory.dmp

          Filesize

          10.6MB

        • memory/1424-2-0x00007FF6D0AF0000-0x00007FF6D158F000-memory.dmp

          Filesize

          10.6MB

        • memory/1424-3-0x00007FF6D0AF0000-0x00007FF6D158F000-memory.dmp

          Filesize

          10.6MB

        • memory/1424-7-0x00007FF6D0AF0000-0x00007FF6D158F000-memory.dmp

          Filesize

          10.6MB

        • memory/1424-6-0x00007FF6D0AF0000-0x00007FF6D158F000-memory.dmp

          Filesize

          10.6MB

        • memory/1424-8-0x00007FF6D0AF0000-0x00007FF6D158F000-memory.dmp

          Filesize

          10.6MB

        • memory/1424-5-0x00007FF6D0AF0000-0x00007FF6D158F000-memory.dmp

          Filesize

          10.6MB

        • memory/1424-9-0x00007FF6D0AF0000-0x00007FF6D158F000-memory.dmp

          Filesize

          10.6MB

        • memory/1424-18-0x00007FF6D0AF0000-0x00007FF6D158F000-memory.dmp

          Filesize

          10.6MB

        We care about your privacy.

        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.