Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 06:10
Behavioral task
behavioral1
Sample
Trixx_Spoofer_protected (1).exe
Resource
win7-20240704-en
windows7-x64
12 signatures
150 seconds
General
-
Target
Trixx_Spoofer_protected (1).exe
-
Size
3.5MB
-
MD5
1ebe588f34203da1d42e36a7aa7e5cd1
-
SHA1
5ed14541f50df5106c77dddf22326092c9d1c23f
-
SHA256
a93a40597266db70576237aeb0f944358a5988ce0bd4799d2f9438ace11bbc48
-
SHA512
2e867970d8d4e5f1ee17321f8e3f2dfc5e4e901ed859d40082e19ff8684f8ce1eb1537055cf70b36b294fecb0a2ba26af33687cd14d6ff0f99975d9f6cceadc8
-
SSDEEP
98304:MWzu1SEzVBy7IRcEU9+CjJ3BCsNy3Ab/EqEVgtDQ:MRj7ywg++Rdg3ArEqEg2
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Trixx_Spoofer_protected (1).exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Trixx_Spoofer_protected (1).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Trixx_Spoofer_protected (1).exe -
resource yara_rule behavioral2/memory/3556-0-0x00007FF7C26E0000-0x00007FF7C3067000-memory.dmp themida behavioral2/memory/3556-3-0x00007FF7C26E0000-0x00007FF7C3067000-memory.dmp themida behavioral2/memory/3556-2-0x00007FF7C26E0000-0x00007FF7C3067000-memory.dmp themida behavioral2/memory/3556-4-0x00007FF7C26E0000-0x00007FF7C3067000-memory.dmp themida behavioral2/memory/3556-5-0x00007FF7C26E0000-0x00007FF7C3067000-memory.dmp themida behavioral2/memory/3556-6-0x00007FF7C26E0000-0x00007FF7C3067000-memory.dmp themida behavioral2/memory/3556-7-0x00007FF7C26E0000-0x00007FF7C3067000-memory.dmp themida behavioral2/memory/3556-9-0x00007FF7C26E0000-0x00007FF7C3067000-memory.dmp themida behavioral2/memory/3556-12-0x00007FF7C26E0000-0x00007FF7C3067000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Trixx_Spoofer_protected (1).exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3556 Trixx_Spoofer_protected (1).exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3556 wrote to memory of 2424 3556 Trixx_Spoofer_protected (1).exe 87 PID 3556 wrote to memory of 2424 3556 Trixx_Spoofer_protected (1).exe 87 PID 2424 wrote to memory of 3684 2424 cmd.exe 88 PID 2424 wrote to memory of 3684 2424 cmd.exe 88 PID 2424 wrote to memory of 3512 2424 cmd.exe 89 PID 2424 wrote to memory of 3512 2424 cmd.exe 89 PID 2424 wrote to memory of 2024 2424 cmd.exe 90 PID 2424 wrote to memory of 2024 2424 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trixx_Spoofer_protected (1).exe"C:\Users\Admin\AppData\Local\Temp\Trixx_Spoofer_protected (1).exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Trixx_Spoofer_protected (1).exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Trixx_Spoofer_protected (1).exe" MD53⤵PID:3684
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:3512
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2024
-
-