Analysis
-
max time kernel
90s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/08/2024, 17:36
Static task
static1
1 signatures
General
-
Target
tlNDolN4Qkqr.exe
-
Size
13.6MB
-
MD5
5ca3146389dc2fe7f6e132e6c00c1210
-
SHA1
2354f206a9a6b8666a3079635904581af2d0868a
-
SHA256
ca0358e48af9810afd985b7f1eb92b07500420626e02daf53949c169e2c0cb62
-
SHA512
ef7eac752cfb98874c20cb0071ae58a8db80762d6bb6fe52eee133fd6ffda15f02c481285fa3ea6bb67fbbca3b76de8a7bc3c8967d2f2dc58882712692100412
-
SSDEEP
196608:7IqlYtZt1fGNcD/qf4YxIWD3rpR3Y3oi2/qxmLcrZ72k640Ka3k422pb+K8BMzcI:7hKtFfGaDyAlonBtOmLLkX0S4Fl+K8ad
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ tlNDolN4Qkqr.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tlNDolN4Qkqr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tlNDolN4Qkqr.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tlNDolN4Qkqr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3532 tlNDolN4Qkqr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemEnvironmentPrivilege 3532 tlNDolN4Qkqr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3532 tlNDolN4Qkqr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3532 wrote to memory of 3028 3532 tlNDolN4Qkqr.exe 78 PID 3532 wrote to memory of 3028 3532 tlNDolN4Qkqr.exe 78 PID 3532 wrote to memory of 3028 3532 tlNDolN4Qkqr.exe 78 PID 3532 wrote to memory of 2904 3532 tlNDolN4Qkqr.exe 79 PID 3532 wrote to memory of 2904 3532 tlNDolN4Qkqr.exe 79 PID 3532 wrote to memory of 2904 3532 tlNDolN4Qkqr.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\tlNDolN4Qkqr.exe"C:\Users\Admin\AppData\Local\Temp\tlNDolN4Qkqr.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵PID:3028
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵PID:2904
-