Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 06:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe
Resource
win7-20240704-en
10 signatures
120 seconds
General
-
Target
dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe
-
Size
5.5MB
-
MD5
c4865b3d54ee16b441b5411077b15560
-
SHA1
a9be8a48ac0e0e84d775acb51ffd0a6460788c10
-
SHA256
dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25
-
SHA512
9b97b41c8df576310abd502687a36a1a4614c016ec30c033bbaece5b78082eab15fa2b11b52f3003794dfa9ebecc266ace8bfed72ee4c54e286eb38055086f25
-
SSDEEP
98304:ohFcAQNBRvP0ZqfYORzo2Iceutfczjbq1aBHIf43TdUPPUeDdxPJkiZBPJp:ohfQNBRvP8JcefzjW1YHlTdSMeDdpJkQ
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2624 dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe"C:\Users\Admin\AppData\Local\Temp\dbb23e697ddf674ff2d0bc732192cfada3d8293e65b70805b6c21b37dec03a25N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2624