Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 06:59
Behavioral task
behavioral1
Sample
2eafb6bf9dddfb1449a3a2731a9d7eb31446c80be1b02b7e95082c72158042f8.exe
Resource
win7-20240903-en
General
-
Target
2eafb6bf9dddfb1449a3a2731a9d7eb31446c80be1b02b7e95082c72158042f8.exe
-
Size
3.3MB
-
MD5
734edb8a35204d2bbd8d9fdfda4eac9e
-
SHA1
98d4bd06bc39b588deccdf23f5d703bba8441cd6
-
SHA256
2eafb6bf9dddfb1449a3a2731a9d7eb31446c80be1b02b7e95082c72158042f8
-
SHA512
ba4fd16bf904983b06a1e6e7c56cced1533a66833817a2dd29b3329d2df64180e3d26482bfed7249af0ab6d0f2180cc35a275b353eb723a78ea9818e6c306952
-
SSDEEP
98304:T4Vqe+qz5WUjIq4AzZULdYem4MsveZ8Xk:10xWdYeTMC1
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2eafb6bf9dddfb1449a3a2731a9d7eb31446c80be1b02b7e95082c72158042f8.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2eafb6bf9dddfb1449a3a2731a9d7eb31446c80be1b02b7e95082c72158042f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2eafb6bf9dddfb1449a3a2731a9d7eb31446c80be1b02b7e95082c72158042f8.exe -
resource yara_rule behavioral1/memory/2712-0-0x0000000000400000-0x0000000000C77000-memory.dmp themida behavioral1/memory/2712-2-0x0000000000400000-0x0000000000C77000-memory.dmp themida behavioral1/memory/2712-3-0x0000000000400000-0x0000000000C77000-memory.dmp themida behavioral1/memory/2712-4-0x0000000000400000-0x0000000000C77000-memory.dmp themida behavioral1/memory/2712-5-0x0000000000400000-0x0000000000C77000-memory.dmp themida behavioral1/memory/2712-6-0x0000000000400000-0x0000000000C77000-memory.dmp themida behavioral1/memory/2712-7-0x0000000000400000-0x0000000000C77000-memory.dmp themida behavioral1/memory/2712-8-0x0000000000400000-0x0000000000C77000-memory.dmp themida behavioral1/memory/2712-9-0x0000000000400000-0x0000000000C77000-memory.dmp themida behavioral1/memory/2712-10-0x0000000000400000-0x0000000000C77000-memory.dmp themida behavioral1/memory/2712-11-0x0000000000400000-0x0000000000C77000-memory.dmp themida behavioral1/memory/2712-12-0x0000000000400000-0x0000000000C77000-memory.dmp themida behavioral1/memory/2712-13-0x0000000000400000-0x0000000000C77000-memory.dmp themida behavioral1/memory/2712-14-0x0000000000400000-0x0000000000C77000-memory.dmp themida behavioral1/memory/2712-15-0x0000000000400000-0x0000000000C77000-memory.dmp themida behavioral1/memory/2712-16-0x0000000000400000-0x0000000000C77000-memory.dmp themida behavioral1/memory/2712-17-0x0000000000400000-0x0000000000C77000-memory.dmp themida behavioral1/memory/2712-18-0x0000000000400000-0x0000000000C77000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2eafb6bf9dddfb1449a3a2731a9d7eb31446c80be1b02b7e95082c72158042f8.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2712 2eafb6bf9dddfb1449a3a2731a9d7eb31446c80be1b02b7e95082c72158042f8.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2eafb6bf9dddfb1449a3a2731a9d7eb31446c80be1b02b7e95082c72158042f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2688 systeminfo.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2712 2eafb6bf9dddfb1449a3a2731a9d7eb31446c80be1b02b7e95082c72158042f8.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2712 2eafb6bf9dddfb1449a3a2731a9d7eb31446c80be1b02b7e95082c72158042f8.exe 2712 2eafb6bf9dddfb1449a3a2731a9d7eb31446c80be1b02b7e95082c72158042f8.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2820 2712 2eafb6bf9dddfb1449a3a2731a9d7eb31446c80be1b02b7e95082c72158042f8.exe 30 PID 2712 wrote to memory of 2820 2712 2eafb6bf9dddfb1449a3a2731a9d7eb31446c80be1b02b7e95082c72158042f8.exe 30 PID 2712 wrote to memory of 2820 2712 2eafb6bf9dddfb1449a3a2731a9d7eb31446c80be1b02b7e95082c72158042f8.exe 30 PID 2712 wrote to memory of 2820 2712 2eafb6bf9dddfb1449a3a2731a9d7eb31446c80be1b02b7e95082c72158042f8.exe 30 PID 2820 wrote to memory of 2688 2820 cmd.exe 32 PID 2820 wrote to memory of 2688 2820 cmd.exe 32 PID 2820 wrote to memory of 2688 2820 cmd.exe 32 PID 2820 wrote to memory of 2688 2820 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2eafb6bf9dddfb1449a3a2731a9d7eb31446c80be1b02b7e95082c72158042f8.exe"C:\Users\Admin\AppData\Local\Temp\2eafb6bf9dddfb1449a3a2731a9d7eb31446c80be1b02b7e95082c72158042f8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\cmd.exe/c systeminfo2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:2688
-
-