Analysis
-
max time kernel
316s -
max time network
317s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 18:57
Behavioral task
behavioral1
Sample
vxvault.net_0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
vxvault.net_0.exe
Resource
win10v2004-20240802-en
General
-
Target
vxvault.net_0.exe
-
Size
2.7MB
-
MD5
d6d04c68b02e6fe72a3ed55ebd36bff0
-
SHA1
ebf3917deb2d30f95ffedd89bdff3adbc85d74bb
-
SHA256
90d5d95b3abb09600ea39b9a58968705967cf7747dd18208fb8220c249002725
-
SHA512
d640502f3e0bbc941c2082f3ebfa805dea8a4d5007b724544c2d7f7af9c96bb766f8e28ce3654adbf273b22c0d54c5e3d241257c4a2936ef781ef2ae9e6ece66
-
SSDEEP
49152:7RpKlE0flBGyaS+vo+O8KYv5KLSlXIH4lHW5ubiug0+v3N8G:lSBGyaRvog4LSlE4euby9d
Malware Config
Extracted
risepro
193.233.132.226:50500
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ vxvault.net_0.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vxvault.net_0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vxvault.net_0.exe -
resource yara_rule behavioral1/memory/576-0-0x0000000000820000-0x0000000000F88000-memory.dmp themida behavioral1/memory/576-25-0x0000000000820000-0x0000000000F88000-memory.dmp themida behavioral1/memory/576-24-0x0000000000820000-0x0000000000F88000-memory.dmp themida behavioral1/memory/576-26-0x0000000000820000-0x0000000000F88000-memory.dmp themida behavioral1/memory/576-27-0x0000000000820000-0x0000000000F88000-memory.dmp themida behavioral1/memory/576-30-0x0000000000820000-0x0000000000F88000-memory.dmp themida behavioral1/memory/576-29-0x0000000000820000-0x0000000000F88000-memory.dmp themida behavioral1/memory/576-28-0x0000000000820000-0x0000000000F88000-memory.dmp themida behavioral1/memory/576-31-0x0000000000820000-0x0000000000F88000-memory.dmp themida behavioral1/memory/576-61-0x0000000000820000-0x0000000000F88000-memory.dmp themida behavioral1/memory/904-62-0x0000000140000000-0x00000001405E8000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vxvault.net_0.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 576 vxvault.net_0.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vxvault.net_0.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 576 vxvault.net_0.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 904 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 904 taskmgr.exe -
Suspicious use of FindShellTrayWindow 54 IoCs
pid Process 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe -
Suspicious use of SendNotifyMessage 53 IoCs
pid Process 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe 904 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\vxvault.net_0.exe"C:\Users\Admin\AppData\Local\Temp\vxvault.net_0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:576
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:904