Analysis
-
max time kernel
300s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 19:24
Static task
static1
Behavioral task
behavioral1
Sample
deluxe.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
razor.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
vt-private.exe
Resource
win10v2004-20240802-en
General
-
Target
vt-private.exe
-
Size
6.7MB
-
MD5
cae02f0f4b3c24d1b6cd08fc2e66f79d
-
SHA1
c1b71f6c94b6c94f20e89ec776c3db0db61300c3
-
SHA256
e6a2f2d04125886c38d5dd310e10188f3e06e7c6c0bb147bedf752dc7b7966c3
-
SHA512
0deed9a9ce2c9be94f68c1ea03c2d1604c689dc905d84df6ebf5a452b1efb8cdf0cac96fb68268b23f2785dac6d27f89c398f97365ae2c1e395b1e8565a52265
-
SSDEEP
98304:Go/LmXvLJSz5yiU6/t3uHRfYHexIuCn74D60uStSEboM0tv7L3wXKuX:iLiyiU6/t3ux+e+QG0uvphtzLAH
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions vt-private.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools vt-private.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vt-private.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vt-private.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum vt-private.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vt-private.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion vt-private.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS vt-private.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer vt-private.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe 3176 vt-private.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3176 vt-private.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\vt-private.exe"C:\Users\Admin\AppData\Local\Temp\vt-private.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3176