Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 09:22
Static task
static1
Behavioral task
behavioral1
Sample
VANGUARD BYPASS.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
VANGUARD BYPASS.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
slayts.1337
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
slayts.1337
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
test.txt
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
test.txt
Resource
win10v2004-20240802-en
General
-
Target
VANGUARD BYPASS.exe
-
Size
2.5MB
-
MD5
2473c143b9591080093561cd3fc42955
-
SHA1
3a65083c411edba6b7a5dcdb93a2bebcc410e95b
-
SHA256
89ee1cbd0ef4390b420dea55744487665d4bf7dcfa2c2597db2984dfad5dff1a
-
SHA512
ae599014de20c34d0b75d938f743dc443b37bbd5095ec4f24548f9cff5a08f48a7959eae0dea070cf5d43d6916a4affe8ff1d825f5d8ab2907f00a9df5a5c334
-
SSDEEP
49152:pXkQq9LDj26Mx1zrHvxx5qaXqQ7hsaNsRBt87lOpSJnQxnDNZGZ8VpDTU2:pXkQqxD8NrHxhXqosaNO8JOY+6OVlU
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion VANGUARD BYPASS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion VANGUARD BYPASS.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2616 VANGUARD BYPASS.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2640 2616 VANGUARD BYPASS.exe 32 PID 2616 wrote to memory of 2640 2616 VANGUARD BYPASS.exe 32 PID 2616 wrote to memory of 2640 2616 VANGUARD BYPASS.exe 32 PID 2640 wrote to memory of 2728 2640 cmd.exe 33 PID 2640 wrote to memory of 2728 2640 cmd.exe 33 PID 2640 wrote to memory of 2728 2640 cmd.exe 33 PID 2640 wrote to memory of 2744 2640 cmd.exe 34 PID 2640 wrote to memory of 2744 2640 cmd.exe 34 PID 2640 wrote to memory of 2744 2640 cmd.exe 34 PID 2640 wrote to memory of 2748 2640 cmd.exe 35 PID 2640 wrote to memory of 2748 2640 cmd.exe 35 PID 2640 wrote to memory of 2748 2640 cmd.exe 35 PID 2616 wrote to memory of 2756 2616 VANGUARD BYPASS.exe 36 PID 2616 wrote to memory of 2756 2616 VANGUARD BYPASS.exe 36 PID 2616 wrote to memory of 2756 2616 VANGUARD BYPASS.exe 36 PID 2756 wrote to memory of 2828 2756 cmd.exe 37 PID 2756 wrote to memory of 2828 2756 cmd.exe 37 PID 2756 wrote to memory of 2828 2756 cmd.exe 37 PID 2756 wrote to memory of 2924 2756 cmd.exe 38 PID 2756 wrote to memory of 2924 2756 cmd.exe 38 PID 2756 wrote to memory of 2924 2756 cmd.exe 38 PID 2756 wrote to memory of 2684 2756 cmd.exe 39 PID 2756 wrote to memory of 2684 2756 cmd.exe 39 PID 2756 wrote to memory of 2684 2756 cmd.exe 39 PID 2616 wrote to memory of 2692 2616 VANGUARD BYPASS.exe 40 PID 2616 wrote to memory of 2692 2616 VANGUARD BYPASS.exe 40 PID 2616 wrote to memory of 2692 2616 VANGUARD BYPASS.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\VANGUARD BYPASS.exe"C:\Users\Admin\AppData\Local\Temp\VANGUARD BYPASS.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\VANGUARD BYPASS.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\VANGUARD BYPASS.exe" MD53⤵PID:2728
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2744
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2748
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "test.txt" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\system32\certutil.execertutil -hashfile "test.txt" MD53⤵PID:2828
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2924
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2684
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2616 -s 7482⤵PID:2692
-