Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 04:14
Behavioral task
behavioral1
Sample
ae48ffa19f469d80ad25970b1dcb6806f239be45d81b27a487eb8315dd46646f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ae48ffa19f469d80ad25970b1dcb6806f239be45d81b27a487eb8315dd46646f.exe
Resource
win10v2004-20241007-en
General
-
Target
ae48ffa19f469d80ad25970b1dcb6806f239be45d81b27a487eb8315dd46646f.exe
-
Size
6.7MB
-
MD5
1d4e6958943d1432903b184afaefd5e4
-
SHA1
2e666e9a4824b68acb8a9d5c329e34afec63da10
-
SHA256
ae48ffa19f469d80ad25970b1dcb6806f239be45d81b27a487eb8315dd46646f
-
SHA512
6a95325c31561d97b872acfc6c60e25299678c90b5ed188483938d001056147c3e1b0c7094c0b85b20dfa50c4c58bab0094f397c1a720542f90ed3fdf30ad06c
-
SSDEEP
196608:b3AHmWm0WyKc2b3W1nyD+5paIFCsbUSZ6TDqi:DG/2yMq8u78s/Z6x
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ae48ffa19f469d80ad25970b1dcb6806f239be45d81b27a487eb8315dd46646f.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\YDArk\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\YDArkDrv.sys" ae48ffa19f469d80ad25970b1dcb6806f239be45d81b27a487eb8315dd46646f.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ae48ffa19f469d80ad25970b1dcb6806f239be45d81b27a487eb8315dd46646f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ae48ffa19f469d80ad25970b1dcb6806f239be45d81b27a487eb8315dd46646f.exe -
resource yara_rule behavioral2/memory/4092-0-0x00007FF713790000-0x00007FF7147CD000-memory.dmp themida behavioral2/memory/4092-2-0x00007FF713790000-0x00007FF7147CD000-memory.dmp themida behavioral2/memory/4092-1-0x00007FF713790000-0x00007FF7147CD000-memory.dmp themida behavioral2/memory/4092-3-0x00007FF713790000-0x00007FF7147CD000-memory.dmp themida behavioral2/memory/4092-4-0x00007FF713790000-0x00007FF7147CD000-memory.dmp themida behavioral2/memory/4092-7-0x00007FF713790000-0x00007FF7147CD000-memory.dmp themida behavioral2/memory/4092-6-0x00007FF713790000-0x00007FF7147CD000-memory.dmp themida behavioral2/memory/4092-8-0x00007FF713790000-0x00007FF7147CD000-memory.dmp themida behavioral2/memory/4092-9-0x00007FF713790000-0x00007FF7147CD000-memory.dmp themida behavioral2/memory/4092-10-0x00007FF713790000-0x00007FF7147CD000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ae48ffa19f469d80ad25970b1dcb6806f239be45d81b27a487eb8315dd46646f.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4092 ae48ffa19f469d80ad25970b1dcb6806f239be45d81b27a487eb8315dd46646f.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4092 ae48ffa19f469d80ad25970b1dcb6806f239be45d81b27a487eb8315dd46646f.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLoadDriverPrivilege 4092 ae48ffa19f469d80ad25970b1dcb6806f239be45d81b27a487eb8315dd46646f.exe Token: SeDebugPrivilege 4092 ae48ffa19f469d80ad25970b1dcb6806f239be45d81b27a487eb8315dd46646f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4092 ae48ffa19f469d80ad25970b1dcb6806f239be45d81b27a487eb8315dd46646f.exe 4092 ae48ffa19f469d80ad25970b1dcb6806f239be45d81b27a487eb8315dd46646f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae48ffa19f469d80ad25970b1dcb6806f239be45d81b27a487eb8315dd46646f.exe"C:\Users\Admin\AppData\Local\Temp\ae48ffa19f469d80ad25970b1dcb6806f239be45d81b27a487eb8315dd46646f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Sets service image path in registry
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4092