Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 11:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SpVymtjqaOUK.exe
Resource
win7-20240705-en
8 signatures
150 seconds
General
-
Target
SpVymtjqaOUK.exe
-
Size
14.0MB
-
MD5
af5617b8c7c07120372ea5114d5c47fc
-
SHA1
4ade6ddd9e72ae9460f2604807405fe84d296a1a
-
SHA256
72f4294c85a73d03922d46c62e5858efd50d96995510df22b93da0b89833c1ec
-
SHA512
ed783c1e91359b060d971d3745a8922e73f63f4534ba81438cfcdff83da5fe27d07bff84979fcc9872b0f29bb4a774f2f6db6072f33cd8482bbedaca34601775
-
SSDEEP
393216:iYZf5+zosIYmy8CcnsOapxtH+MLMzylBGFy:3Zf5+0lLPnVapxtxMzylBr
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SpVymtjqaOUK.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SpVymtjqaOUK.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SpVymtjqaOUK.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SpVymtjqaOUK.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2136 SpVymtjqaOUK.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemEnvironmentPrivilege 2136 SpVymtjqaOUK.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2136 SpVymtjqaOUK.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2872 2136 SpVymtjqaOUK.exe 30 PID 2136 wrote to memory of 2872 2136 SpVymtjqaOUK.exe 30 PID 2136 wrote to memory of 2872 2136 SpVymtjqaOUK.exe 30 PID 2136 wrote to memory of 2872 2136 SpVymtjqaOUK.exe 30 PID 2136 wrote to memory of 2664 2136 SpVymtjqaOUK.exe 31 PID 2136 wrote to memory of 2664 2136 SpVymtjqaOUK.exe 31 PID 2136 wrote to memory of 2664 2136 SpVymtjqaOUK.exe 31 PID 2136 wrote to memory of 2664 2136 SpVymtjqaOUK.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\SpVymtjqaOUK.exe"C:\Users\Admin\AppData\Local\Temp\SpVymtjqaOUK.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵PID:2872
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵PID:2664
-