Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 00:31
Behavioral task
behavioral1
Sample
suspal.exe
Resource
win7-20240903-en
General
-
Target
suspal.exe
-
Size
15.1MB
-
MD5
0a248e00d9f3999b03c8353ec80ab8e9
-
SHA1
e3a5b0a07cf077bdffc44fe0c29b8ef32d832126
-
SHA256
fe04f4bf0e57120148e49b67e1860f329f3ce5aade47f05e7c8a1d64e1816dca
-
SHA512
4762495bce3e8d7e2806208aad69dccb7d7f7545df581050142579f60fa7ee986141fd12dbef89c64544b07311dd87430a91a606d4751077840b19b3af92ba6e
-
SSDEEP
393216:FTMPFy6utYG43mbtgsAQxQX3OBkTEzhMJCM8J:9MPI6ua3vsEOBkTCYK
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ suspal.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion suspal.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion suspal.exe -
Obfuscated with Agile.Net obfuscator 3 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/2120-0-0x0000000000400000-0x00000000008EA000-memory.dmp agile_net behavioral1/memory/2120-3-0x0000000000400000-0x000000000089C000-memory.dmp agile_net behavioral1/memory/2120-32-0x0000000000400000-0x00000000008EA000-memory.dmp agile_net -
resource yara_rule behavioral1/memory/2120-16-0x0000000005930000-0x0000000006265000-memory.dmp themida behavioral1/memory/2120-6-0x0000000010000000-0x000000001149D000-memory.dmp themida behavioral1/memory/2120-20-0x0000000010000000-0x000000001149D000-memory.dmp themida behavioral1/memory/2120-18-0x0000000010000000-0x000000001149D000-memory.dmp themida behavioral1/memory/2120-22-0x0000000010000000-0x000000001149D000-memory.dmp themida behavioral1/memory/2120-19-0x0000000010000000-0x000000001149D000-memory.dmp themida behavioral1/memory/2120-21-0x0000000010000000-0x000000001149D000-memory.dmp themida behavioral1/memory/2120-23-0x0000000010000000-0x000000001149D000-memory.dmp themida behavioral1/memory/2120-35-0x0000000010000000-0x000000001149D000-memory.dmp themida behavioral1/memory/2120-52-0x0000000010000000-0x000000001149D000-memory.dmp themida behavioral1/memory/2120-64-0x0000000010000000-0x000000001149D000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA suspal.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2120 suspal.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language suspal.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe 2120 suspal.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2120 suspal.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\suspal.exe"C:\Users\Admin\AppData\Local\Temp\suspal.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120