Analysis
-
max time kernel
35s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 04:05
Behavioral task
behavioral1
Sample
Twisted.exe
Resource
win7-20240705-en
7 signatures
150 seconds
General
-
Target
Twisted.exe
-
Size
5.1MB
-
MD5
e5770eae6267ab9ba53718c9202883a9
-
SHA1
f70826e588182fe03f10510df41c7341c81de99c
-
SHA256
5af0b5326fdc164f0bc6c4f9e10959e523b15b2fec6c882a93863e08f26041ef
-
SHA512
8b8c94a7f18a3c2e60162396780908a419ee876ad62c5dc933db858ed335b2b1b670fe63c62b8cde416c02b9a5e191bca2eb7e972b06cfc7cfa93a93562faae5
-
SSDEEP
98304:J1ejTMD5b6DV596t4w/wNLAtL4dTQqq0WMZVA1H+:j+Kb6DV596BoNLTQMWQVAh
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Twisted.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Twisted.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Twisted.exe -
resource yara_rule behavioral2/memory/1356-0-0x00007FF78BD60000-0x00007FF78C9DD000-memory.dmp themida behavioral2/memory/1356-6-0x00007FF78BD60000-0x00007FF78C9DD000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Twisted.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1356 Twisted.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1356 set thread context of 32 1356 Twisted.exe 85 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1356 wrote to memory of 32 1356 Twisted.exe 85 PID 1356 wrote to memory of 32 1356 Twisted.exe 85 PID 1356 wrote to memory of 32 1356 Twisted.exe 85 PID 1356 wrote to memory of 32 1356 Twisted.exe 85 PID 1356 wrote to memory of 32 1356 Twisted.exe 85 PID 1356 wrote to memory of 32 1356 Twisted.exe 85 PID 1356 wrote to memory of 32 1356 Twisted.exe 85 PID 1356 wrote to memory of 32 1356 Twisted.exe 85 PID 1356 wrote to memory of 32 1356 Twisted.exe 85 PID 1356 wrote to memory of 32 1356 Twisted.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Twisted.exe"C:\Users\Admin\AppData\Local\Temp\Twisted.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"2⤵PID:32
-