Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 15:03
Static task
static1
Behavioral task
behavioral1
Sample
09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe
Resource
win10v2004-20241007-en
General
-
Target
09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe
-
Size
922KB
-
MD5
1bcf37c39b0d6636b70f77c36ec74ae1
-
SHA1
b3170ccee0ce4dd6728787617610aeff9369172d
-
SHA256
09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8
-
SHA512
69fb83cbf94979f2ecc1835b21cf837bd716be367047ff462f5932d892c01c1d5e9c56b7b7c9b173cb3d4818ff85dd730f0ba5e50416e8e33e706b4731a4762e
-
SSDEEP
24576:E8Z717dQ9Biw+L9RHhAPF4WANJ6fdO1sUcmN/:EwxGTRwbyev4PUc
Malware Config
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Wine 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe -
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeShutdownPrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe Token: SeCreatePagefilePrivilege 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2388 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 84 PID 1620 wrote to memory of 2388 1620 09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe 84 PID 2388 wrote to memory of 980 2388 cmd.exe 85 PID 2388 wrote to memory of 980 2388 cmd.exe 85 PID 2388 wrote to memory of 1160 2388 cmd.exe 86 PID 2388 wrote to memory of 1160 2388 cmd.exe 86 PID 2388 wrote to memory of 5100 2388 cmd.exe 87 PID 2388 wrote to memory of 5100 2388 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe"C:\Users\Admin\AppData\Local\Temp\09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe"1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Maps connected drives based on registry
- Checks system information in the registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks for VirtualBox DLLs, possible anti-VM trick
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\09de762b98fe0596ebc110411115ca553bf071b4243889a6e11f84f53ba53eb8.exe" MD53⤵PID:980
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:1160
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:5100
-
-