Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 04:05
Behavioral task
behavioral1
Sample
Twisted.exe
Resource
win7-20240705-en
7 signatures
150 seconds
General
-
Target
Twisted.exe
-
Size
5.1MB
-
MD5
e5770eae6267ab9ba53718c9202883a9
-
SHA1
f70826e588182fe03f10510df41c7341c81de99c
-
SHA256
5af0b5326fdc164f0bc6c4f9e10959e523b15b2fec6c882a93863e08f26041ef
-
SHA512
8b8c94a7f18a3c2e60162396780908a419ee876ad62c5dc933db858ed335b2b1b670fe63c62b8cde416c02b9a5e191bca2eb7e972b06cfc7cfa93a93562faae5
-
SSDEEP
98304:J1ejTMD5b6DV596t4w/wNLAtL4dTQqq0WMZVA1H+:j+Kb6DV596BoNLTQMWQVAh
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Twisted.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Twisted.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Twisted.exe -
resource yara_rule behavioral1/memory/1820-0-0x000000013F920000-0x000000014059D000-memory.dmp themida behavioral1/memory/1820-20-0x000000013F920000-0x000000014059D000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Twisted.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1820 Twisted.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1820 set thread context of 2424 1820 Twisted.exe 29 -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2424 1820 Twisted.exe 29 PID 1820 wrote to memory of 2424 1820 Twisted.exe 29 PID 1820 wrote to memory of 2424 1820 Twisted.exe 29 PID 1820 wrote to memory of 2424 1820 Twisted.exe 29 PID 1820 wrote to memory of 2424 1820 Twisted.exe 29 PID 1820 wrote to memory of 2424 1820 Twisted.exe 29 PID 1820 wrote to memory of 2424 1820 Twisted.exe 29 PID 1820 wrote to memory of 2424 1820 Twisted.exe 29 PID 1820 wrote to memory of 2424 1820 Twisted.exe 29 PID 1820 wrote to memory of 2424 1820 Twisted.exe 29 PID 1820 wrote to memory of 2424 1820 Twisted.exe 29 PID 2424 wrote to memory of 2796 2424 Taskmgr.exe 31 PID 2424 wrote to memory of 2796 2424 Taskmgr.exe 31 PID 2424 wrote to memory of 2796 2424 Taskmgr.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Twisted.exe"C:\Users\Admin\AppData\Local\Temp\Twisted.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2424 -s 1123⤵PID:2796
-
-