Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 12:00

General

  • Target

    7UwyHmKx00aB7vI0W6MvnkKA.exe

  • Size

    2.4MB

  • MD5

    b15db436045c3f484296acc6cff34a86

  • SHA1

    346ae322b55e14611f10a64f336aaa9ff6fed68c

  • SHA256

    dab2a18df66f2e74d0831a8b118de6b9df2642ac939cbad0552e30696d644193

  • SHA512

    804bee37e0a6247ef2edb5dba8d4b6820ff10b0a4cb76e4c039a7242285836ed5255a1f297f8ba96168d9295558844a9fd7ec3a977207f339296a001543c1fd9

  • SSDEEP

    49152:/JhGe/xVHII4W2qFRCsh7BQ0vLYtA2uORNJet/ylyPj792:/Jcevr2mLS0cT/Mj792

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7UwyHmKx00aB7vI0W6MvnkKA.exe
    "C:\Users\Admin\AppData\Local\Temp\7UwyHmKx00aB7vI0W6MvnkKA.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    PID:4260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4260-0-0x0000000000AA0000-0x0000000001100000-memory.dmp

    Filesize

    6.4MB

  • memory/4260-1-0x00000000768B0000-0x00000000768B1000-memory.dmp

    Filesize

    4KB

  • memory/4260-4-0x0000000076890000-0x0000000076980000-memory.dmp

    Filesize

    960KB

  • memory/4260-3-0x0000000076890000-0x0000000076980000-memory.dmp

    Filesize

    960KB

  • memory/4260-2-0x0000000076890000-0x0000000076980000-memory.dmp

    Filesize

    960KB

  • memory/4260-8-0x0000000076890000-0x0000000076980000-memory.dmp

    Filesize

    960KB

  • memory/4260-7-0x0000000076890000-0x0000000076980000-memory.dmp

    Filesize

    960KB

  • memory/4260-6-0x0000000076890000-0x0000000076980000-memory.dmp

    Filesize

    960KB

  • memory/4260-5-0x0000000076890000-0x0000000076980000-memory.dmp

    Filesize

    960KB

  • memory/4260-12-0x0000000000AA0000-0x0000000001100000-memory.dmp

    Filesize

    6.4MB

  • memory/4260-13-0x0000000006200000-0x0000000006818000-memory.dmp

    Filesize

    6.1MB

  • memory/4260-14-0x0000000005B90000-0x0000000005BA2000-memory.dmp

    Filesize

    72KB

  • memory/4260-15-0x0000000005CF0000-0x0000000005DFA000-memory.dmp

    Filesize

    1.0MB

  • memory/4260-16-0x0000000005C20000-0x0000000005C5C000-memory.dmp

    Filesize

    240KB

  • memory/4260-17-0x0000000005C60000-0x0000000005CAC000-memory.dmp

    Filesize

    304KB

  • memory/4260-18-0x0000000000AA0000-0x0000000001100000-memory.dmp

    Filesize

    6.4MB

  • memory/4260-19-0x00000000768B0000-0x00000000768B1000-memory.dmp

    Filesize

    4KB

  • memory/4260-20-0x0000000076890000-0x0000000076980000-memory.dmp

    Filesize

    960KB

  • memory/4260-21-0x0000000076890000-0x0000000076980000-memory.dmp

    Filesize

    960KB

  • memory/4260-22-0x0000000076890000-0x0000000076980000-memory.dmp

    Filesize

    960KB

  • memory/4260-23-0x0000000076890000-0x0000000076980000-memory.dmp

    Filesize

    960KB

  • memory/4260-24-0x0000000076890000-0x0000000076980000-memory.dmp

    Filesize

    960KB

  • memory/4260-25-0x0000000076890000-0x0000000076980000-memory.dmp

    Filesize

    960KB

  • memory/4260-27-0x0000000076890000-0x0000000076980000-memory.dmp

    Filesize

    960KB