Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 12:03

General

  • Target

    7UwyHmKx00aB7vI0W6MvnkKA.exe

  • Size

    2.4MB

  • MD5

    b15db436045c3f484296acc6cff34a86

  • SHA1

    346ae322b55e14611f10a64f336aaa9ff6fed68c

  • SHA256

    dab2a18df66f2e74d0831a8b118de6b9df2642ac939cbad0552e30696d644193

  • SHA512

    804bee37e0a6247ef2edb5dba8d4b6820ff10b0a4cb76e4c039a7242285836ed5255a1f297f8ba96168d9295558844a9fd7ec3a977207f339296a001543c1fd9

  • SSDEEP

    49152:/JhGe/xVHII4W2qFRCsh7BQ0vLYtA2uORNJet/ylyPj792:/Jcevr2mLS0cT/Mj792

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7UwyHmKx00aB7vI0W6MvnkKA.exe
    "C:\Users\Admin\AppData\Local\Temp\7UwyHmKx00aB7vI0W6MvnkKA.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    PID:4156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4156-0-0x00000000005B0000-0x0000000000C10000-memory.dmp

    Filesize

    6.4MB

  • memory/4156-1-0x00000000763E0000-0x00000000763E1000-memory.dmp

    Filesize

    4KB

  • memory/4156-5-0x00000000763C0000-0x00000000764B0000-memory.dmp

    Filesize

    960KB

  • memory/4156-7-0x00000000763C0000-0x00000000764B0000-memory.dmp

    Filesize

    960KB

  • memory/4156-6-0x00000000763C0000-0x00000000764B0000-memory.dmp

    Filesize

    960KB

  • memory/4156-8-0x00000000763C0000-0x00000000764B0000-memory.dmp

    Filesize

    960KB

  • memory/4156-4-0x00000000763C0000-0x00000000764B0000-memory.dmp

    Filesize

    960KB

  • memory/4156-3-0x00000000763C0000-0x00000000764B0000-memory.dmp

    Filesize

    960KB

  • memory/4156-2-0x00000000763C0000-0x00000000764B0000-memory.dmp

    Filesize

    960KB

  • memory/4156-12-0x00000000005B0000-0x0000000000C10000-memory.dmp

    Filesize

    6.4MB

  • memory/4156-14-0x00000000052A0000-0x00000000052B2000-memory.dmp

    Filesize

    72KB

  • memory/4156-13-0x0000000005860000-0x0000000005E78000-memory.dmp

    Filesize

    6.1MB

  • memory/4156-15-0x00000000053D0000-0x00000000054DA000-memory.dmp

    Filesize

    1.0MB

  • memory/4156-16-0x0000000005300000-0x000000000533C000-memory.dmp

    Filesize

    240KB

  • memory/4156-17-0x0000000005340000-0x000000000538C000-memory.dmp

    Filesize

    304KB

  • memory/4156-18-0x00000000005B0000-0x0000000000C10000-memory.dmp

    Filesize

    6.4MB

  • memory/4156-19-0x00000000763E0000-0x00000000763E1000-memory.dmp

    Filesize

    4KB

  • memory/4156-20-0x00000000763C0000-0x00000000764B0000-memory.dmp

    Filesize

    960KB

  • memory/4156-21-0x00000000763C0000-0x00000000764B0000-memory.dmp

    Filesize

    960KB

  • memory/4156-22-0x00000000763C0000-0x00000000764B0000-memory.dmp

    Filesize

    960KB

  • memory/4156-23-0x00000000763C0000-0x00000000764B0000-memory.dmp

    Filesize

    960KB

  • memory/4156-24-0x00000000763C0000-0x00000000764B0000-memory.dmp

    Filesize

    960KB

  • memory/4156-25-0x00000000763C0000-0x00000000764B0000-memory.dmp

    Filesize

    960KB

  • memory/4156-27-0x00000000763C0000-0x00000000764B0000-memory.dmp

    Filesize

    960KB