Analysis

  • max time kernel
    92s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-09-2024 09:53

General

  • Target

    Launcher.exe

  • Size

    8.9MB

  • MD5

    9735691492f03a9934b10cf4d5952b0f

  • SHA1

    a04338aae787575a9e26a027823403f1e40104ae

  • SHA256

    0d4e06055ef63fb9161397420163b71f2855ab162558c7694ab9a36bc1628a25

  • SHA512

    256bf16ad5865c1e2dc1900ea8cbf4410df05c0d5a4d75541d0a44a09ac28c267cfab3a3acf6292bd19bb0e569058a33d6a0c29c325ebdef1bd9d8438ba23348

  • SSDEEP

    196608:aTriQv16LlzlNHHy6+2dFDcRcBK7UdwBbIw3NQbsO:+0BXS6+BY4DBcwW

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 11 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Launcher.exe
    "C:\Users\Admin\AppData\Local\Temp\Launcher.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of FindShellTrayWindow
    PID:4692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4692-0-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp

    Filesize

    23.8MB

  • memory/4692-1-0x00007FFFF4DF0000-0x00007FFFF4DF2000-memory.dmp

    Filesize

    8KB

  • memory/4692-2-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp

    Filesize

    23.8MB

  • memory/4692-3-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp

    Filesize

    23.8MB

  • memory/4692-4-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp

    Filesize

    23.8MB

  • memory/4692-5-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp

    Filesize

    23.8MB

  • memory/4692-6-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp

    Filesize

    23.8MB

  • memory/4692-7-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp

    Filesize

    23.8MB

  • memory/4692-8-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp

    Filesize

    23.8MB

  • memory/4692-9-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp

    Filesize

    23.8MB

  • memory/4692-10-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp

    Filesize

    23.8MB

  • memory/4692-13-0x00007FF693E00000-0x00007FF6955C0000-memory.dmp

    Filesize

    23.8MB