Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09-08-2024 06:09
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Loader.exe
Resource
win10v2004-20240802-en
General
-
Target
Loader.exe
-
Size
12.9MB
-
MD5
d92cf3066f5aba8a9d66d10af47e2d95
-
SHA1
8e7d9ea4003c86cbea43ccf976d5a28da1706fe4
-
SHA256
716713b54f0545eace341a962440705dc28a4fbaab02ee15bbf31a44d8c688f5
-
SHA512
0621650cab23dfffbfe6877f42f04317bd3508bf3426900a0f479cf84d6d399cff371ebf90a567c1fc740ed7ac8dd0fff326067f404ecc70826faf86b5b6252d
-
SSDEEP
393216:8kR/hpScfBpGKfqkyDUTf4XOXBKEywJoNCDnKiY2Hhay/FxaUwHI:8kU0C+ykfh83wJoNmKbGb/2vI
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Loader.exe -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\winhb.sys Loader.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Loader.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Loader.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2444} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2869} Loader.exe File opened for modification C:\Windows\System32\IME\IMETC\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2899} Loader.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2604 Loader.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2892} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-UPDATE} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2893} Loader.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2644 sc.exe 1716 sc.exe 2676 sc.exe 2528 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2604 Loader.exe 2604 Loader.exe 2604 Loader.exe 2604 Loader.exe 2604 Loader.exe 2604 Loader.exe 2604 Loader.exe 2604 Loader.exe 2604 Loader.exe 2604 Loader.exe 2604 Loader.exe 2604 Loader.exe 2604 Loader.exe 2604 Loader.exe 2604 Loader.exe 2604 Loader.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2840 2604 Loader.exe 31 PID 2604 wrote to memory of 2840 2604 Loader.exe 31 PID 2604 wrote to memory of 2840 2604 Loader.exe 31 PID 2840 wrote to memory of 2644 2840 cmd.exe 33 PID 2840 wrote to memory of 2644 2840 cmd.exe 33 PID 2840 wrote to memory of 2644 2840 cmd.exe 33 PID 2604 wrote to memory of 2516 2604 Loader.exe 34 PID 2604 wrote to memory of 2516 2604 Loader.exe 34 PID 2604 wrote to memory of 2516 2604 Loader.exe 34 PID 2604 wrote to memory of 2208 2604 Loader.exe 35 PID 2604 wrote to memory of 2208 2604 Loader.exe 35 PID 2604 wrote to memory of 2208 2604 Loader.exe 35 PID 2604 wrote to memory of 2628 2604 Loader.exe 36 PID 2604 wrote to memory of 2628 2604 Loader.exe 36 PID 2604 wrote to memory of 2628 2604 Loader.exe 36 PID 2628 wrote to memory of 2900 2628 cmd.exe 39 PID 2628 wrote to memory of 2900 2628 cmd.exe 39 PID 2628 wrote to memory of 2900 2628 cmd.exe 39 PID 2628 wrote to memory of 2532 2628 cmd.exe 40 PID 2628 wrote to memory of 2532 2628 cmd.exe 40 PID 2628 wrote to memory of 2532 2628 cmd.exe 40 PID 2628 wrote to memory of 1004 2628 cmd.exe 41 PID 2628 wrote to memory of 1004 2628 cmd.exe 41 PID 2628 wrote to memory of 1004 2628 cmd.exe 41 PID 2208 wrote to memory of 1716 2208 cmd.exe 42 PID 2208 wrote to memory of 1716 2208 cmd.exe 42 PID 2208 wrote to memory of 1716 2208 cmd.exe 42 PID 2516 wrote to memory of 2676 2516 cmd.exe 43 PID 2516 wrote to memory of 2676 2516 cmd.exe 43 PID 2516 wrote to memory of 2676 2516 cmd.exe 43 PID 2604 wrote to memory of 2684 2604 Loader.exe 44 PID 2604 wrote to memory of 2684 2604 Loader.exe 44 PID 2604 wrote to memory of 2684 2604 Loader.exe 44 PID 2684 wrote to memory of 2528 2684 cmd.exe 46 PID 2684 wrote to memory of 2528 2684 cmd.exe 46 PID 2684 wrote to memory of 2528 2684 cmd.exe 46 PID 2604 wrote to memory of 904 2604 Loader.exe 47 PID 2604 wrote to memory of 904 2604 Loader.exe 47 PID 2604 wrote to memory of 904 2604 Loader.exe 47 PID 2604 wrote to memory of 2608 2604 Loader.exe 48 PID 2604 wrote to memory of 2608 2604 Loader.exe 48 PID 2604 wrote to memory of 2608 2604 Loader.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc create windowsproc type=kernel binpath=C:\Windows\System32\drivers\winhb.sys2⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\sc.exesc create windowsproc type=kernel binpath=C:\Windows\System32\drivers\winhb.sys3⤵
- Launches sc.exe
PID:2644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc create windowsproc type=kernel binpath=C:\Windows\System32\drivers\winhb.sys2⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\system32\sc.exesc create windowsproc type=kernel binpath=C:\Windows\System32\drivers\winhb.sys3⤵
- Launches sc.exe
PID:2676
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc start windowsproc2⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\system32\sc.exesc start windowsproc3⤵
- Launches sc.exe
PID:1716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Loader.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Loader.exe" MD53⤵PID:2900
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2532
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:1004
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc start windowsproc2⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\system32\sc.exesc start windowsproc3⤵
- Launches sc.exe
PID:2528
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2608
-