Overview
overview
10Static
static
3AMI/AMIDEWINx64.exe
windows7-x64
1AMI/AMIDEWINx64.exe
windows10-2004-x64
1AMI/amigendrv64.sys
windows10-2004-x64
1AMI/spoof.bat
windows7-x64
1AMI/spoof.bat
windows10-2004-x64
1Insyde/H2O...64.exe
windows7-x64
5Insyde/H2O...64.exe
windows10-2004-x64
Insyde/seg...64.sys
windows7-x64
1Insyde/seg...64.sys
windows10-2004-x64
1Insyde/spoof.bat
windows7-x64
5Insyde/spoof.bat
windows10-2004-x64
VHD/VHD.bat
windows7-x64
3VHD/VHD.bat
windows10-2004-x64
3check.bat
windows7-x64
1check.bat
windows10-2004-x64
5tweaks/1.bat
windows7-x64
10tweaks/1.bat
windows10-2004-x64
10Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
AMI/AMIDEWINx64.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AMI/AMIDEWINx64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
AMI/amigendrv64.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
AMI/spoof.bat
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
AMI/spoof.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
Insyde/H2OSDE-Wx64.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
Insyde/H2OSDE-Wx64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
Insyde/segwindrvx64.sys
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
Insyde/segwindrvx64.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
Insyde/spoof.bat
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
Insyde/spoof.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
VHD/VHD.bat
Resource
win7-20240704-en
Behavioral task
behavioral13
Sample
VHD/VHD.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
check.bat
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
check.bat
Resource
win10v2004-20240910-en
Behavioral task
behavioral16
Sample
tweaks/1.bat
Resource
win7-20240729-en
Behavioral task
behavioral17
Sample
tweaks/1.bat
Resource
win10v2004-20240802-en
General
-
Target
VHD/VHD.bat
-
Size
82B
-
MD5
945e0ff83a6f23cf0568ba1444af9384
-
SHA1
184d295e43c244bb4891b79927e45049f9a1b8fe
-
SHA256
569a3ea35752c5f848269f90cc8fd72f3e587e44c987e9986af242ba3cbc93d8
-
SHA512
00991d10ec9fb366288b1a025eac20e2986ed31a09853dacc47dca21b420213d251c72c6006b32c02f77611284496d4ce2e4511e818de67d82e87342fd9b7789
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2752 vds.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2752 vds.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2800 2732 cmd.exe 31 PID 2732 wrote to memory of 2800 2732 cmd.exe 31 PID 2732 wrote to memory of 2800 2732 cmd.exe 31 PID 2732 wrote to memory of 2864 2732 cmd.exe 34 PID 2732 wrote to memory of 2864 2732 cmd.exe 34 PID 2732 wrote to memory of 2864 2732 cmd.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\VHD\VHD.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\diskpart.exediskpart /s 1.txt2⤵PID:2800
-
-
C:\Windows\system32\control.execontrol /name Microsoft.StorageSpaces2⤵PID:2864
-
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2784
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:2604