Analysis

  • max time kernel
    6s
  • max time network
    7s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2024 20:42

General

  • Target

    3.2.5_protected.exe

  • Size

    4.6MB

  • MD5

    745ec5c98a6ad15d28d86fb1bfcba633

  • SHA1

    88796dd0bb9292c06ecf10300855c7113e51cda1

  • SHA256

    ec6b6962c9f928398fbb568907df16bee8d54fe50f62a6ab6414a31b28b042fb

  • SHA512

    159a5c81773629ac775f8b68cf7930ea6c0c885ec32d2e67bb557b8a6924018d06b05434b8e0b8dca56ad7327586b54d67eb9ad0a02a70ecf0dfe3c2cf604618

  • SSDEEP

    98304:ELvqHMnmk9icnr5iElJmfC9Llghv4qJlKYqhMiEw/BTdMkoMBUs9vqfuN:xs1VnN7Dt03JcEwpTdISx17N

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3.2.5_protected.exe
    "C:\Users\Admin\AppData\Local\Temp\3.2.5_protected.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    PID:3680
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 944
      2⤵
      • Program crash
      PID:3616
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3680 -ip 3680
    1⤵
      PID:692

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3680-0-0x0000000000480000-0x0000000000EE2000-memory.dmp

      Filesize

      10.4MB

    • memory/3680-2-0x00000000752F0000-0x00000000753E0000-memory.dmp

      Filesize

      960KB

    • memory/3680-1-0x0000000075310000-0x0000000075311000-memory.dmp

      Filesize

      4KB

    • memory/3680-3-0x00000000752F0000-0x00000000753E0000-memory.dmp

      Filesize

      960KB

    • memory/3680-4-0x00000000752F0000-0x00000000753E0000-memory.dmp

      Filesize

      960KB

    • memory/3680-5-0x00000000752F0000-0x00000000753E0000-memory.dmp

      Filesize

      960KB

    • memory/3680-6-0x00000000752F0000-0x00000000753E0000-memory.dmp

      Filesize

      960KB

    • memory/3680-7-0x00000000752F0000-0x00000000753E0000-memory.dmp

      Filesize

      960KB

    • memory/3680-10-0x0000000000480000-0x0000000000EE2000-memory.dmp

      Filesize

      10.4MB

    • memory/3680-11-0x0000000000480000-0x0000000000EE2000-memory.dmp

      Filesize

      10.4MB

    • memory/3680-12-0x00000000060C0000-0x0000000006664000-memory.dmp

      Filesize

      5.6MB

    • memory/3680-13-0x0000000005BB0000-0x0000000005C42000-memory.dmp

      Filesize

      584KB

    • memory/3680-15-0x0000000000480000-0x0000000000EE2000-memory.dmp

      Filesize

      10.4MB

    • memory/3680-16-0x00000000752F0000-0x00000000753E0000-memory.dmp

      Filesize

      960KB