Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 12:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ea0c4716392811317b028bf8b6696a.exe
Resource
win7-20240708-en
6 signatures
600 seconds
General
-
Target
ea0c4716392811317b028bf8b6696a.exe
-
Size
4.3MB
-
MD5
e696d6cfe4311e3b45bf19487197a28f
-
SHA1
4ec8b5ee651f7e89cd2731e039df8769e794b1d8
-
SHA256
356d4424f1de3a02ed9eeaddfe87f11002ff25bfa731223df6b8a1f4702fc592
-
SHA512
c0b3f0f69e96ffb4c103235559ce628d21d126567a1f8f6228b09c4796a2ea7107a1e9a36aa6838d5f389207d0b5cc3c8eb122e117ed00c17851b70fa44d4cd0
-
SSDEEP
98304:glZ3/O22lcvYe2TchqvLLoDLnMeGxZhXwma4ZPRwycKlgL6Wq8q3KvW+x:glNO7K2IhqzOGVwmauPRZ/Mt
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ea0c4716392811317b028bf8b6696a.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ea0c4716392811317b028bf8b6696a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ea0c4716392811317b028bf8b6696a.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ea0c4716392811317b028bf8b6696a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2392 ea0c4716392811317b028bf8b6696a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2392 ea0c4716392811317b028bf8b6696a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2392 ea0c4716392811317b028bf8b6696a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea0c4716392811317b028bf8b6696a.exe"C:\Users\Admin\AppData\Local\Temp\ea0c4716392811317b028bf8b6696a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2392