Analysis
-
max time kernel
18s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 12:17
General
-
Target
vax loader_protected.exe
-
Size
2.8MB
-
MD5
78acdef46270d9b357032e0050752c50
-
SHA1
d5ae2895b3855b634406a2afc8ddda83c2b2fec6
-
SHA256
b89ca81fe6a92e47a8587732ba500132345d187972d825ca70d18191cb61f36a
-
SHA512
48fa74be027f95f40d74fc94e8d62b39ed12ec3403b5e6c0782a40c5a737f42da3ede4ef9e168bc6fcc842e11c1c31bea5d43a12d991aab346a559b06e83a8ca
-
SSDEEP
49152:U5jjZUvK1KnoWpI7I1oE/KsOAC12pgeClroU9M+9kN4k8JDj8R4Q1cUWS:UjZU2x+R/I2qtNoU9M9N4FJDjMZ6w
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ vax loader_protected.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vax loader_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vax loader_protected.exe -
resource yara_rule behavioral1/memory/3016-0-0x00007FF6A8AD0000-0x00007FF6A936B000-memory.dmp themida behavioral1/memory/3016-3-0x00007FF6A8AD0000-0x00007FF6A936B000-memory.dmp themida behavioral1/memory/3016-4-0x00007FF6A8AD0000-0x00007FF6A936B000-memory.dmp themida behavioral1/memory/3016-2-0x00007FF6A8AD0000-0x00007FF6A936B000-memory.dmp themida behavioral1/memory/3016-5-0x00007FF6A8AD0000-0x00007FF6A936B000-memory.dmp themida behavioral1/memory/3016-6-0x00007FF6A8AD0000-0x00007FF6A936B000-memory.dmp themida behavioral1/memory/3016-7-0x00007FF6A8AD0000-0x00007FF6A936B000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vax loader_protected.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3016 vax loader_protected.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3016 vax loader_protected.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2348 3016 vax loader_protected.exe 88 PID 3016 wrote to memory of 2348 3016 vax loader_protected.exe 88 PID 2348 wrote to memory of 3672 2348 cmd.exe 90 PID 2348 wrote to memory of 3672 2348 cmd.exe 90 PID 2348 wrote to memory of 3728 2348 cmd.exe 91 PID 2348 wrote to memory of 3728 2348 cmd.exe 91 PID 2348 wrote to memory of 4892 2348 cmd.exe 92 PID 2348 wrote to memory of 4892 2348 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\vax loader_protected.exe"C:\Users\Admin\AppData\Local\Temp\vax loader_protected.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\vax loader_protected.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\vax loader_protected.exe" MD53⤵PID:3672
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:3728
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:4892
-
-