Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 09:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
VANGUARD BYPASS.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
VANGUARD BYPASS.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
VANGUARD BYPASS.exe
-
Size
2.5MB
-
MD5
2473c143b9591080093561cd3fc42955
-
SHA1
3a65083c411edba6b7a5dcdb93a2bebcc410e95b
-
SHA256
89ee1cbd0ef4390b420dea55744487665d4bf7dcfa2c2597db2984dfad5dff1a
-
SHA512
ae599014de20c34d0b75d938f743dc443b37bbd5095ec4f24548f9cff5a08f48a7959eae0dea070cf5d43d6916a4affe8ff1d825f5d8ab2907f00a9df5a5c334
-
SSDEEP
49152:pXkQq9LDj26Mx1zrHvxx5qaXqQ7hsaNsRBt87lOpSJnQxnDNZGZ8VpDTU2:pXkQqxD8NrHxhXqosaNO8JOY+6OVlU
Score
7/10
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion VANGUARD BYPASS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion VANGUARD BYPASS.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1696 VANGUARD BYPASS.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2804 1696 VANGUARD BYPASS.exe 31 PID 1696 wrote to memory of 2804 1696 VANGUARD BYPASS.exe 31 PID 1696 wrote to memory of 2804 1696 VANGUARD BYPASS.exe 31 PID 2804 wrote to memory of 2820 2804 cmd.exe 32 PID 2804 wrote to memory of 2820 2804 cmd.exe 32 PID 2804 wrote to memory of 2820 2804 cmd.exe 32 PID 2804 wrote to memory of 2824 2804 cmd.exe 33 PID 2804 wrote to memory of 2824 2804 cmd.exe 33 PID 2804 wrote to memory of 2824 2804 cmd.exe 33 PID 2804 wrote to memory of 2832 2804 cmd.exe 34 PID 2804 wrote to memory of 2832 2804 cmd.exe 34 PID 2804 wrote to memory of 2832 2804 cmd.exe 34 PID 1696 wrote to memory of 2888 1696 VANGUARD BYPASS.exe 35 PID 1696 wrote to memory of 2888 1696 VANGUARD BYPASS.exe 35 PID 1696 wrote to memory of 2888 1696 VANGUARD BYPASS.exe 35 PID 2888 wrote to memory of 2808 2888 cmd.exe 36 PID 2888 wrote to memory of 2808 2888 cmd.exe 36 PID 2888 wrote to memory of 2808 2888 cmd.exe 36 PID 2888 wrote to memory of 2768 2888 cmd.exe 37 PID 2888 wrote to memory of 2768 2888 cmd.exe 37 PID 2888 wrote to memory of 2768 2888 cmd.exe 37 PID 2888 wrote to memory of 2736 2888 cmd.exe 38 PID 2888 wrote to memory of 2736 2888 cmd.exe 38 PID 2888 wrote to memory of 2736 2888 cmd.exe 38 PID 1696 wrote to memory of 2864 1696 VANGUARD BYPASS.exe 39 PID 1696 wrote to memory of 2864 1696 VANGUARD BYPASS.exe 39 PID 1696 wrote to memory of 2864 1696 VANGUARD BYPASS.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\VANGUARD BYPASS.exe"C:\Users\Admin\AppData\Local\Temp\VANGUARD BYPASS.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\VANGUARD BYPASS.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\VANGUARD BYPASS.exe" MD53⤵PID:2820
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2824
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2832
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "test.txt" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\system32\certutil.execertutil -hashfile "test.txt" MD53⤵PID:2808
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2768
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2736
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1696 -s 7442⤵PID:2864
-