Analysis
-
max time kernel
78s -
max time network
82s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 22:10
Behavioral task
behavioral1
Sample
Privacy Protector.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
Privacy Protector.exe
-
Size
8.6MB
-
MD5
fbf038e5ef2e30da99e88371531dfebc
-
SHA1
b0507491cf241aa4da8b73ef513528b2a937aa2c
-
SHA256
0890f0b89e5c5745ad4bfaf1ca6459c5b765adae9cc2d0988e9456894350b434
-
SHA512
2526c6e621b64c861aa5baddd9e80d2bdd5cd7d628be115584e3f0471536ab95ef85be48ae06b5207bc70f9e6eeeb75ceebc2594ebda6b1878cbc22f8321ea84
-
SSDEEP
196608:gAHP6FQVWZ0C1+eqy/rRXEChq+ZExY37lJo9aM2yf/2dI:KPqWRUChqCtLlW5X2dI
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Privacy Protector.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Privacy Protector.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Privacy Protector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Privacy Protector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Privacy Protector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Privacy Protector.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Privacy Protector.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Privacy Protector.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 624 Privacy Protector.exe 624 Privacy Protector.exe 624 Privacy Protector.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe 4876 Privacy Protector.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 624 Privacy Protector.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4876 wrote to memory of 724 4876 Privacy Protector.exe 97 PID 4876 wrote to memory of 724 4876 Privacy Protector.exe 97 PID 724 wrote to memory of 3096 724 cmd.exe 98 PID 724 wrote to memory of 3096 724 cmd.exe 98 PID 724 wrote to memory of 2628 724 cmd.exe 99 PID 724 wrote to memory of 2628 724 cmd.exe 99 PID 724 wrote to memory of 1224 724 cmd.exe 100 PID 724 wrote to memory of 1224 724 cmd.exe 100 PID 4876 wrote to memory of 4812 4876 Privacy Protector.exe 103 PID 4876 wrote to memory of 4812 4876 Privacy Protector.exe 103 PID 624 wrote to memory of 3628 624 Privacy Protector.exe 120 PID 624 wrote to memory of 3628 624 Privacy Protector.exe 120 PID 3628 wrote to memory of 1660 3628 cmd.exe 121 PID 3628 wrote to memory of 1660 3628 cmd.exe 121 PID 3628 wrote to memory of 4620 3628 cmd.exe 122 PID 3628 wrote to memory of 4620 3628 cmd.exe 122 PID 3628 wrote to memory of 4740 3628 cmd.exe 123 PID 3628 wrote to memory of 4740 3628 cmd.exe 123 PID 624 wrote to memory of 1628 624 Privacy Protector.exe 124 PID 624 wrote to memory of 1628 624 Privacy Protector.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\Privacy Protector.exe"C:\Users\Admin\AppData\Local\Temp\Privacy Protector.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Privacy Protector.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Privacy Protector.exe" MD53⤵PID:3096
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2628
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:1224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Color 052⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4160,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=3928 /prefetch:81⤵PID:5032
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3940
-
C:\Users\Admin\Desktop\Privacy Protector.exe"C:\Users\Admin\Desktop\Privacy Protector.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\Desktop\Privacy Protector.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\Desktop\Privacy Protector.exe" MD53⤵PID:1660
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:4620
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:4740
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Color 052⤵PID:1628
-