Analysis
-
max time kernel
23s -
max time network
11s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 09:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
VANGUARD BYPASS.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
VANGUARD BYPASS.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
VANGUARD BYPASS.exe
-
Size
2.5MB
-
MD5
2473c143b9591080093561cd3fc42955
-
SHA1
3a65083c411edba6b7a5dcdb93a2bebcc410e95b
-
SHA256
89ee1cbd0ef4390b420dea55744487665d4bf7dcfa2c2597db2984dfad5dff1a
-
SHA512
ae599014de20c34d0b75d938f743dc443b37bbd5095ec4f24548f9cff5a08f48a7959eae0dea070cf5d43d6916a4affe8ff1d825f5d8ab2907f00a9df5a5c334
-
SSDEEP
49152:pXkQq9LDj26Mx1zrHvxx5qaXqQ7hsaNsRBt87lOpSJnQxnDNZGZ8VpDTU2:pXkQqxD8NrHxhXqosaNO8JOY+6OVlU
Score
7/10
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion VANGUARD BYPASS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion VANGUARD BYPASS.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2912 VANGUARD BYPASS.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2912 wrote to memory of 4996 2912 VANGUARD BYPASS.exe 89 PID 2912 wrote to memory of 4996 2912 VANGUARD BYPASS.exe 89 PID 4996 wrote to memory of 1072 4996 cmd.exe 90 PID 4996 wrote to memory of 1072 4996 cmd.exe 90 PID 4996 wrote to memory of 1920 4996 cmd.exe 91 PID 4996 wrote to memory of 1920 4996 cmd.exe 91 PID 4996 wrote to memory of 3160 4996 cmd.exe 92 PID 4996 wrote to memory of 3160 4996 cmd.exe 92 PID 2912 wrote to memory of 1816 2912 VANGUARD BYPASS.exe 93 PID 2912 wrote to memory of 1816 2912 VANGUARD BYPASS.exe 93 PID 1816 wrote to memory of 2356 1816 cmd.exe 94 PID 1816 wrote to memory of 2356 1816 cmd.exe 94 PID 1816 wrote to memory of 2888 1816 cmd.exe 95 PID 1816 wrote to memory of 2888 1816 cmd.exe 95 PID 1816 wrote to memory of 2312 1816 cmd.exe 96 PID 1816 wrote to memory of 2312 1816 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\VANGUARD BYPASS.exe"C:\Users\Admin\AppData\Local\Temp\VANGUARD BYPASS.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\VANGUARD BYPASS.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\VANGUARD BYPASS.exe" MD53⤵PID:1072
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:1920
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:3160
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "test.txt" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\system32\certutil.execertutil -hashfile "test.txt" MD53⤵PID:2356
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2888
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2312
-
-