Analysis
-
max time kernel
93s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2024 06:09
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Loader.exe
Resource
win10v2004-20240802-en
General
-
Target
Loader.exe
-
Size
12.9MB
-
MD5
d92cf3066f5aba8a9d66d10af47e2d95
-
SHA1
8e7d9ea4003c86cbea43ccf976d5a28da1706fe4
-
SHA256
716713b54f0545eace341a962440705dc28a4fbaab02ee15bbf31a44d8c688f5
-
SHA512
0621650cab23dfffbfe6877f42f04317bd3508bf3426900a0f479cf84d6d399cff371ebf90a567c1fc740ed7ac8dd0fff326067f404ecc70826faf86b5b6252d
-
SSDEEP
393216:8kR/hpScfBpGKfqkyDUTf4XOXBKEywJoNCDnKiY2Hhay/FxaUwHI:8kU0C+ykfh83wJoNmKbGb/2vI
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Loader.exe -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\winhb.sys Loader.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Loader.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation Loader.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Loader.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2869} Loader.exe File opened for modification C:\Windows\System32\IME\IMETC\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2899} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2444} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Loader.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3180 Loader.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-UPDATE} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2893} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2892} Loader.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Loader.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5012 sc.exe 2268 sc.exe 884 sc.exe 5028 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe 3180 Loader.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 664 Process not Found 664 Process not Found -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3180 wrote to memory of 224 3180 Loader.exe 87 PID 3180 wrote to memory of 224 3180 Loader.exe 87 PID 224 wrote to memory of 5012 224 cmd.exe 89 PID 224 wrote to memory of 5012 224 cmd.exe 89 PID 3180 wrote to memory of 4476 3180 Loader.exe 90 PID 3180 wrote to memory of 4476 3180 Loader.exe 90 PID 4476 wrote to memory of 2268 4476 cmd.exe 92 PID 4476 wrote to memory of 2268 4476 cmd.exe 92 PID 3180 wrote to memory of 2428 3180 Loader.exe 93 PID 3180 wrote to memory of 2428 3180 Loader.exe 93 PID 3180 wrote to memory of 980 3180 Loader.exe 95 PID 3180 wrote to memory of 980 3180 Loader.exe 95 PID 3180 wrote to memory of 3608 3180 Loader.exe 97 PID 3180 wrote to memory of 3608 3180 Loader.exe 97 PID 3608 wrote to memory of 2000 3608 cmd.exe 98 PID 3608 wrote to memory of 2000 3608 cmd.exe 98 PID 2428 wrote to memory of 884 2428 cmd.exe 99 PID 2428 wrote to memory of 884 2428 cmd.exe 99 PID 3608 wrote to memory of 4312 3608 cmd.exe 100 PID 3608 wrote to memory of 4312 3608 cmd.exe 100 PID 3608 wrote to memory of 1948 3608 cmd.exe 101 PID 3608 wrote to memory of 1948 3608 cmd.exe 101 PID 980 wrote to memory of 5028 980 cmd.exe 102 PID 980 wrote to memory of 5028 980 cmd.exe 102 PID 3180 wrote to memory of 3056 3180 Loader.exe 103 PID 3180 wrote to memory of 3056 3180 Loader.exe 103 PID 3180 wrote to memory of 1648 3180 Loader.exe 104 PID 3180 wrote to memory of 1648 3180 Loader.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc create windowsproc type=kernel binpath=C:\Windows\System32\drivers\winhb.sys2⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\system32\sc.exesc create windowsproc type=kernel binpath=C:\Windows\System32\drivers\winhb.sys3⤵
- Launches sc.exe
PID:5012
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc start windowsproc2⤵
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\system32\sc.exesc start windowsproc3⤵
- Launches sc.exe
PID:2268
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc create windowsproc type=kernel binpath=C:\Windows\System32\drivers\winhb.sys2⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\system32\sc.exesc create windowsproc type=kernel binpath=C:\Windows\System32\drivers\winhb.sys3⤵
- Launches sc.exe
PID:884
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc start windowsproc2⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\system32\sc.exesc start windowsproc3⤵
- Launches sc.exe
PID:5028
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Loader.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Loader.exe" MD53⤵PID:2000
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:4312
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:1948
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1648
-