Analysis
-
max time kernel
63s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 09:22
Static task
static1
Behavioral task
behavioral1
Sample
VANGUARD BYPASS.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
VANGUARD BYPASS.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
slayts.1337
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
slayts.1337
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
test.txt
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
test.txt
Resource
win10v2004-20240802-en
General
-
Target
VANGUARD BYPASS.exe
-
Size
2.5MB
-
MD5
2473c143b9591080093561cd3fc42955
-
SHA1
3a65083c411edba6b7a5dcdb93a2bebcc410e95b
-
SHA256
89ee1cbd0ef4390b420dea55744487665d4bf7dcfa2c2597db2984dfad5dff1a
-
SHA512
ae599014de20c34d0b75d938f743dc443b37bbd5095ec4f24548f9cff5a08f48a7959eae0dea070cf5d43d6916a4affe8ff1d825f5d8ab2907f00a9df5a5c334
-
SSDEEP
49152:pXkQq9LDj26Mx1zrHvxx5qaXqQ7hsaNsRBt87lOpSJnQxnDNZGZ8VpDTU2:pXkQqxD8NrHxhXqosaNO8JOY+6OVlU
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion VANGUARD BYPASS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion VANGUARD BYPASS.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4720 VANGUARD BYPASS.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4720 wrote to memory of 1784 4720 VANGUARD BYPASS.exe 87 PID 4720 wrote to memory of 1784 4720 VANGUARD BYPASS.exe 87 PID 1784 wrote to memory of 2964 1784 cmd.exe 90 PID 1784 wrote to memory of 2964 1784 cmd.exe 90 PID 1784 wrote to memory of 672 1784 cmd.exe 91 PID 1784 wrote to memory of 672 1784 cmd.exe 91 PID 1784 wrote to memory of 1876 1784 cmd.exe 92 PID 1784 wrote to memory of 1876 1784 cmd.exe 92 PID 4720 wrote to memory of 4256 4720 VANGUARD BYPASS.exe 93 PID 4720 wrote to memory of 4256 4720 VANGUARD BYPASS.exe 93 PID 4256 wrote to memory of 2740 4256 cmd.exe 94 PID 4256 wrote to memory of 2740 4256 cmd.exe 94 PID 4256 wrote to memory of 3644 4256 cmd.exe 95 PID 4256 wrote to memory of 3644 4256 cmd.exe 95 PID 4256 wrote to memory of 4384 4256 cmd.exe 96 PID 4256 wrote to memory of 4384 4256 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\VANGUARD BYPASS.exe"C:\Users\Admin\AppData\Local\Temp\VANGUARD BYPASS.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\VANGUARD BYPASS.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\VANGUARD BYPASS.exe" MD53⤵PID:2964
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:672
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:1876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "test.txt" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\system32\certutil.execertutil -hashfile "test.txt" MD53⤵PID:2740
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:3644
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:4384
-
-