Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 10:47

General

  • Target

    OvVYhhgvd6ZhUony5cRMqVoB.exe

  • Size

    2.4MB

  • MD5

    b15db436045c3f484296acc6cff34a86

  • SHA1

    346ae322b55e14611f10a64f336aaa9ff6fed68c

  • SHA256

    dab2a18df66f2e74d0831a8b118de6b9df2642ac939cbad0552e30696d644193

  • SHA512

    804bee37e0a6247ef2edb5dba8d4b6820ff10b0a4cb76e4c039a7242285836ed5255a1f297f8ba96168d9295558844a9fd7ec3a977207f339296a001543c1fd9

  • SSDEEP

    49152:/JhGe/xVHII4W2qFRCsh7BQ0vLYtA2uORNJet/ylyPj792:/Jcevr2mLS0cT/Mj792

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\OvVYhhgvd6ZhUony5cRMqVoB.exe
    "C:\Users\Admin\AppData\Local\Temp\OvVYhhgvd6ZhUony5cRMqVoB.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    PID:1820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1820-0-0x0000000000D60000-0x00000000013C0000-memory.dmp

    Filesize

    6.4MB

  • memory/1820-1-0x00000000772F0000-0x00000000772F1000-memory.dmp

    Filesize

    4KB

  • memory/1820-2-0x00000000772D0000-0x00000000773C0000-memory.dmp

    Filesize

    960KB

  • memory/1820-3-0x00000000772D0000-0x00000000773C0000-memory.dmp

    Filesize

    960KB

  • memory/1820-6-0x00000000772D0000-0x00000000773C0000-memory.dmp

    Filesize

    960KB

  • memory/1820-5-0x00000000772D0000-0x00000000773C0000-memory.dmp

    Filesize

    960KB

  • memory/1820-4-0x00000000772D0000-0x00000000773C0000-memory.dmp

    Filesize

    960KB

  • memory/1820-10-0x0000000000D60000-0x00000000013C0000-memory.dmp

    Filesize

    6.4MB

  • memory/1820-11-0x00000000065F0000-0x0000000006C08000-memory.dmp

    Filesize

    6.1MB

  • memory/1820-12-0x0000000005FA0000-0x0000000005FB2000-memory.dmp

    Filesize

    72KB

  • memory/1820-13-0x00000000060E0000-0x00000000061EA000-memory.dmp

    Filesize

    1.0MB

  • memory/1820-14-0x0000000006010000-0x000000000604C000-memory.dmp

    Filesize

    240KB

  • memory/1820-15-0x0000000006050000-0x000000000609C000-memory.dmp

    Filesize

    304KB

  • memory/1820-16-0x0000000000D60000-0x00000000013C0000-memory.dmp

    Filesize

    6.4MB

  • memory/1820-17-0x00000000772F0000-0x00000000772F1000-memory.dmp

    Filesize

    4KB

  • memory/1820-18-0x00000000772D0000-0x00000000773C0000-memory.dmp

    Filesize

    960KB

  • memory/1820-19-0x00000000772D0000-0x00000000773C0000-memory.dmp

    Filesize

    960KB

  • memory/1820-20-0x00000000772D0000-0x00000000773C0000-memory.dmp

    Filesize

    960KB

  • memory/1820-21-0x00000000772D0000-0x00000000773C0000-memory.dmp

    Filesize

    960KB

  • memory/1820-22-0x00000000772D0000-0x00000000773C0000-memory.dmp

    Filesize

    960KB

  • memory/1820-23-0x00000000772D0000-0x00000000773C0000-memory.dmp

    Filesize

    960KB

  • memory/1820-25-0x00000000772D0000-0x00000000773C0000-memory.dmp

    Filesize

    960KB