Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 04:16
Behavioral task
behavioral1
Sample
f445e496a05f3d45920d225dd1532c98b93b53c62358778bd68453d2c6eba877N.exe
Resource
win7-20240704-en
windows7-x64
9 signatures
120 seconds
General
-
Target
f445e496a05f3d45920d225dd1532c98b93b53c62358778bd68453d2c6eba877N.exe
-
Size
5.3MB
-
MD5
3e9a3c0f1e01f004e0ff669257afcd80
-
SHA1
9226820ebee217d76d358268269f22ad969a8f41
-
SHA256
f445e496a05f3d45920d225dd1532c98b93b53c62358778bd68453d2c6eba877
-
SHA512
f431d419f08bf3818d5252706da42dc734f3a2586f3090bacc217d25668cac0eea09124348d8bae349a656db3f951d5a262387e8b9062903faf059e72a617bb2
-
SSDEEP
98304:Fl6tTOYLPmZN3bo62tapuG4+fbHv15GG+plNDu/dKHqOC6:utTOKOZZ32wpuG4WbaXU/dKHJX
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f445e496a05f3d45920d225dd1532c98b93b53c62358778bd68453d2c6eba877N.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f445e496a05f3d45920d225dd1532c98b93b53c62358778bd68453d2c6eba877N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f445e496a05f3d45920d225dd1532c98b93b53c62358778bd68453d2c6eba877N.exe -
Deletes itself 1 IoCs
pid Process 3028 cmd.exe -
resource yara_rule behavioral1/memory/2900-0-0x000000013F450000-0x00000001401E5000-memory.dmp themida behavioral1/memory/2900-2-0x000000013F450000-0x00000001401E5000-memory.dmp themida behavioral1/memory/2900-5-0x000000013F450000-0x00000001401E5000-memory.dmp themida behavioral1/memory/2900-4-0x000000013F450000-0x00000001401E5000-memory.dmp themida behavioral1/memory/2900-3-0x000000013F450000-0x00000001401E5000-memory.dmp themida behavioral1/memory/2900-6-0x000000013F450000-0x00000001401E5000-memory.dmp themida behavioral1/memory/2900-22-0x000000013F450000-0x00000001401E5000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA f445e496a05f3d45920d225dd1532c98b93b53c62358778bd68453d2c6eba877N.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2900 f445e496a05f3d45920d225dd1532c98b93b53c62358778bd68453d2c6eba877N.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3028 cmd.exe 1792 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1792 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2900 wrote to memory of 3028 2900 f445e496a05f3d45920d225dd1532c98b93b53c62358778bd68453d2c6eba877N.exe 33 PID 2900 wrote to memory of 3028 2900 f445e496a05f3d45920d225dd1532c98b93b53c62358778bd68453d2c6eba877N.exe 33 PID 2900 wrote to memory of 3028 2900 f445e496a05f3d45920d225dd1532c98b93b53c62358778bd68453d2c6eba877N.exe 33 PID 3028 wrote to memory of 1792 3028 cmd.exe 35 PID 3028 wrote to memory of 1792 3028 cmd.exe 35 PID 3028 wrote to memory of 1792 3028 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\f445e496a05f3d45920d225dd1532c98b93b53c62358778bd68453d2c6eba877N.exe"C:\Users\Admin\AppData\Local\Temp\f445e496a05f3d45920d225dd1532c98b93b53c62358778bd68453d2c6eba877N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\f445e496a05f3d45920d225dd1532c98b93b53c62358778bd68453d2c6eba877N.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1792
-
-