Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2024 09:53
Behavioral task
behavioral1
Sample
Launcher.exe
Resource
win7-20240729-en
windows7-x64
5 signatures
150 seconds
General
-
Target
Launcher.exe
-
Size
8.9MB
-
MD5
9735691492f03a9934b10cf4d5952b0f
-
SHA1
a04338aae787575a9e26a027823403f1e40104ae
-
SHA256
0d4e06055ef63fb9161397420163b71f2855ab162558c7694ab9a36bc1628a25
-
SHA512
256bf16ad5865c1e2dc1900ea8cbf4410df05c0d5a4d75541d0a44a09ac28c267cfab3a3acf6292bd19bb0e569058a33d6a0c29c325ebdef1bd9d8438ba23348
-
SSDEEP
196608:aTriQv16LlzlNHHy6+2dFDcRcBK7UdwBbIw3NQbsO:+0BXS6+BY4DBcwW
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Launcher.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Launcher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Launcher.exe -
resource yara_rule behavioral2/memory/4692-0-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp themida behavioral2/memory/4692-2-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp themida behavioral2/memory/4692-3-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp themida behavioral2/memory/4692-4-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp themida behavioral2/memory/4692-5-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp themida behavioral2/memory/4692-6-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp themida behavioral2/memory/4692-7-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp themida behavioral2/memory/4692-8-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp themida behavioral2/memory/4692-9-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp themida behavioral2/memory/4692-10-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp themida behavioral2/memory/4692-13-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Launcher.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4692 Launcher.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4692 Launcher.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of FindShellTrayWindow
PID:4692