Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 16:10
Behavioral task
behavioral1
Sample
honda.exe
Resource
win7-20240903-en
General
-
Target
honda.exe
-
Size
12.6MB
-
MD5
0fd93d95f5427314c472acf35a741bd8
-
SHA1
82c4a03fc289ff7231a55c781838a07cf2cb3afd
-
SHA256
cb8109d659672303e80f6666d566f8192f3134d3d67048e1a60ff3ace62c66f5
-
SHA512
566a7036ccc924aee8b49b69c031b5e77ca85f4ff643db5c82e0ac9533a1a687c844858ae0de080dc29ecc6d74b95cc0eca50d7ccc8f158104e32d2dd241f518
-
SSDEEP
196608:yL9vGiCff7yl3nCIjvDMjYeVa65nT84FMIZETSwjPePdrQJ/BGOqJ9Au5DYPF:yLdGiCbsSIrDMjPgQETSwvJEOqQYDQ
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ honda.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ honda.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion honda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion honda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion honda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion honda.exe -
Loads dropped DLL 1 IoCs
pid Process 2104 honda.exe -
resource yara_rule behavioral1/memory/1260-0-0x000000013FD50000-0x000000014093D000-memory.dmp themida behavioral1/memory/1260-8-0x000000013FD50000-0x000000014093D000-memory.dmp themida behavioral1/memory/1260-7-0x000000013FD50000-0x000000014093D000-memory.dmp themida behavioral1/memory/1260-6-0x000000013FD50000-0x000000014093D000-memory.dmp themida behavioral1/memory/1260-2-0x000000013FD50000-0x000000014093D000-memory.dmp themida behavioral1/memory/1260-4-0x000000013FD50000-0x000000014093D000-memory.dmp themida behavioral1/memory/1260-5-0x000000013FD50000-0x000000014093D000-memory.dmp themida behavioral1/memory/1260-3-0x000000013FD50000-0x000000014093D000-memory.dmp themida behavioral1/memory/2104-33-0x000000013FD50000-0x000000014093D000-memory.dmp themida behavioral1/memory/2104-34-0x000000013FD50000-0x000000014093D000-memory.dmp themida behavioral1/memory/2104-32-0x000000013FD50000-0x000000014093D000-memory.dmp themida behavioral1/memory/2104-31-0x000000013FD50000-0x000000014093D000-memory.dmp themida behavioral1/memory/2104-38-0x000000013FD50000-0x000000014093D000-memory.dmp themida behavioral1/memory/2104-37-0x000000013FD50000-0x000000014093D000-memory.dmp themida behavioral1/memory/2104-36-0x000000013FD50000-0x000000014093D000-memory.dmp themida behavioral1/memory/2104-39-0x000000013FD50000-0x000000014093D000-memory.dmp themida behavioral1/memory/2104-43-0x000000013FD50000-0x000000014093D000-memory.dmp themida behavioral1/memory/1260-66-0x000000013FD50000-0x000000014093D000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA honda.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA honda.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1260 honda.exe 2104 honda.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2104 1260 honda.exe 32 PID 1260 wrote to memory of 2104 1260 honda.exe 32 PID 1260 wrote to memory of 2104 1260 honda.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\honda.exe"C:\Users\Admin\AppData\Local\Temp\honda.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\honda.exe"C:\Users\Admin\AppData\Local\Temp\honda.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD55a5dd7cad8028097842b0afef45bfbcf
SHA1e247a2e460687c607253949c52ae2801ff35dc4a
SHA256a811c7516f531f1515d10743ae78004dd627eba0dc2d3bc0d2e033b2722043ce
SHA512e6268e4fad2ce3ef16b68298a57498e16f0262bf3531539ad013a66f72df471569f94c6fcc48154b7c3049a3ad15cbfcbb6345dacb4f4ed7d528c74d589c9858