Analysis
-
max time kernel
5s -
max time network
2s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 09:06
Behavioral task
behavioral1
Sample
f6dc77cf97248705.exe
Resource
win7-20240704-en
7 signatures
150 seconds
General
-
Target
f6dc77cf97248705.exe
-
Size
7.5MB
-
MD5
9c55c7aa31fb62d86dd01acb874915e4
-
SHA1
f3a6e8c137161cf019f348478e16b6567349d0de
-
SHA256
4ef56786406de222d74924b80a77a016baeaba25c1e503c14bde82e632323d01
-
SHA512
595fb7eed1c572786c76a6693dbd6699974919e6c49af5d56663c1ec1c7a5e6f57674705e250ab95b86fce45878272e094509b59dbe2f9da5347b0e494391ee6
-
SSDEEP
98304:NV06zzC5ONdCPQxBvHy4njc2WPIu55CecI5WZvTvR/Tu0V2ulGWKILcj:Y6a3PQxN1jFWPR5IedC5flGWE
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f6dc77cf97248705.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f6dc77cf97248705.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f6dc77cf97248705.exe -
resource yara_rule behavioral1/memory/1748-0-0x000000013FC50000-0x0000000140CC2000-memory.dmp themida behavioral1/memory/1748-8-0x000000013FC50000-0x0000000140CC2000-memory.dmp themida behavioral1/memory/1748-18-0x000000013FC50000-0x0000000140CC2000-memory.dmp themida behavioral1/memory/1748-17-0x000000013FC50000-0x0000000140CC2000-memory.dmp themida behavioral1/memory/1748-16-0x000000013FC50000-0x0000000140CC2000-memory.dmp themida behavioral1/memory/1748-9-0x000000013FC50000-0x0000000140CC2000-memory.dmp themida behavioral1/memory/1748-7-0x000000013FC50000-0x0000000140CC2000-memory.dmp themida behavioral1/memory/1748-20-0x000000013FC50000-0x0000000140CC2000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA f6dc77cf97248705.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1748 f6dc77cf97248705.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1748 f6dc77cf97248705.exe 1748 f6dc77cf97248705.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2396 1748 f6dc77cf97248705.exe 31 PID 1748 wrote to memory of 2396 1748 f6dc77cf97248705.exe 31 PID 1748 wrote to memory of 2396 1748 f6dc77cf97248705.exe 31 PID 1748 wrote to memory of 2204 1748 f6dc77cf97248705.exe 32 PID 1748 wrote to memory of 2204 1748 f6dc77cf97248705.exe 32 PID 1748 wrote to memory of 2204 1748 f6dc77cf97248705.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6dc77cf97248705.exe"C:\Users\Admin\AppData\Local\Temp\f6dc77cf97248705.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2396
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1748 -s 5722⤵PID:2204
-