Overview
overview
10Static
static
70hS8ndFapM...Jf.exe
windows7-x64
100hS8ndFapM...Jf.exe
windows10-2004-x64
100rr48RlGuy...xg.exe
windows7-x64
80rr48RlGuy...xg.exe
windows10-2004-x64
821oenuW1qn...e5.exe
windows7-x64
1021oenuW1qn...e5.exe
windows10-2004-x64
1025jZMPTiQq...9r.exe
windows7-x64
1025jZMPTiQq...9r.exe
windows10-2004-x64
1028NEs4WOAb...Dx.exe
windows7-x64
928NEs4WOAb...Dx.exe
windows10-2004-x64
92DWwzYoIDs...wH.exe
windows7-x64
102DWwzYoIDs...wH.exe
windows10-2004-x64
104sqg3EO3n4...E3.exe
windows7-x64
104sqg3EO3n4...E3.exe
windows10-2004-x64
106IvhC9RrHt...Qm.exe
windows7-x64
106IvhC9RrHt...Qm.exe
windows10-2004-x64
106K69WRpYoP...wA.exe
windows7-x64
36K69WRpYoP...wA.exe
windows10-2004-x64
76RVcR1WSzn...fp.exe
windows7-x64
36RVcR1WSzn...fp.exe
windows10-2004-x64
77UwyHmKx00...KA.exe
windows7-x64
97UwyHmKx00...KA.exe
windows10-2004-x64
988wncypnTK...tt.exe
windows7-x64
88wncypnTK...tt.exe
windows10-2004-x64
18Jw_RggGj5...71.exe
windows7-x64
78Jw_RggGj5...71.exe
windows10-2004-x64
7A04WVFPeCH...H9.exe
windows7-x64
10A04WVFPeCH...H9.exe
windows10-2004-x64
10A5ulgq_bFX...0Z.exe
windows7-x64
10A5ulgq_bFX...0Z.exe
windows10-2004-x64
10AU3ie6Mv1v...zZ.exe
windows7-x64
10AU3ie6Mv1v...zZ.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 12:03
Behavioral task
behavioral1
Sample
0hS8ndFapMyi9bpBTCoeqfJf.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0hS8ndFapMyi9bpBTCoeqfJf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
0rr48RlGuyf8MbsABD4Fd5xg.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
0rr48RlGuyf8MbsABD4Fd5xg.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
21oenuW1qnqk7qUsHH7Z2We5.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
21oenuW1qnqk7qUsHH7Z2We5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
25jZMPTiQqNIVH0Cs2hi6z9r.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
25jZMPTiQqNIVH0Cs2hi6z9r.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
28NEs4WOAbFCrw46bjrvW6Dx.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
28NEs4WOAbFCrw46bjrvW6Dx.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
2DWwzYoIDsZeXAHrWMUgq7wH.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
2DWwzYoIDsZeXAHrWMUgq7wH.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
4sqg3EO3n4bilXTOwELzdyE3.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
4sqg3EO3n4bilXTOwELzdyE3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
6IvhC9RrHtvRf0BCVttVUFQm.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
6IvhC9RrHtvRf0BCVttVUFQm.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
6K69WRpYoPgt3vIoWRXmpAwA.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
6K69WRpYoPgt3vIoWRXmpAwA.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
6RVcR1WSznUXUS8RtLypZMfp.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
6RVcR1WSznUXUS8RtLypZMfp.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
7UwyHmKx00aB7vI0W6MvnkKA.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
7UwyHmKx00aB7vI0W6MvnkKA.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
88wncypnTKvKj7Uwab0iiutt.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
88wncypnTKvKj7Uwab0iiutt.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
8Jw_RggGj5lBX2auQAnIQe71.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
8Jw_RggGj5lBX2auQAnIQe71.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
A04WVFPeCHaejSnQmBHCogH9.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
A04WVFPeCHaejSnQmBHCogH9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
A5ulgq_bFXMyWAYNZZbTBZ0Z.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
A5ulgq_bFXMyWAYNZZbTBZ0Z.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
AU3ie6Mv1vmus72LuhNF2jzZ.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
AU3ie6Mv1vmus72LuhNF2jzZ.exe
Resource
win10v2004-20241007-en
General
-
Target
28NEs4WOAbFCrw46bjrvW6Dx.exe
-
Size
2.5MB
-
MD5
f4f313d1f82fa87e710bd947a3667384
-
SHA1
6ac08dd818b3dac502041508399f8c6392668521
-
SHA256
492f4d8cae0b2cd6105f089b368d322bf6e388a803890f5196d5ccc4ac85bb04
-
SHA512
97e4af0f46fa9e9b3d5a916af3a50bb6c9ba4df8fd5d63c63764f2a421f0eb04b4d48df2293152dcbe6184ffeb8adb9552d250aaab0e2f95ffdea443a853b59a
-
SSDEEP
49152:zKQVnnBfPya5I4GMsUvwYcD9mKDGYNUe5hBlg1RIpxfFF:vtBXPTG74wYtiGY73xj
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
28NEs4WOAbFCrw46bjrvW6Dx.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 28NEs4WOAbFCrw46bjrvW6Dx.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
28NEs4WOAbFCrw46bjrvW6Dx.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 28NEs4WOAbFCrw46bjrvW6Dx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 28NEs4WOAbFCrw46bjrvW6Dx.exe -
Processes:
resource yara_rule behavioral10/memory/1772-9-0x0000000000110000-0x000000000076E000-memory.dmp themida -
Processes:
28NEs4WOAbFCrw46bjrvW6Dx.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 28NEs4WOAbFCrw46bjrvW6Dx.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
28NEs4WOAbFCrw46bjrvW6Dx.exepid process 1772 28NEs4WOAbFCrw46bjrvW6Dx.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
28NEs4WOAbFCrw46bjrvW6Dx.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28NEs4WOAbFCrw46bjrvW6Dx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28NEs4WOAbFCrw46bjrvW6Dx.exe"C:\Users\Admin\AppData\Local\Temp\28NEs4WOAbFCrw46bjrvW6Dx.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1772