Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 16:10

General

  • Target

    honda.exe

  • Size

    12.6MB

  • MD5

    0fd93d95f5427314c472acf35a741bd8

  • SHA1

    82c4a03fc289ff7231a55c781838a07cf2cb3afd

  • SHA256

    cb8109d659672303e80f6666d566f8192f3134d3d67048e1a60ff3ace62c66f5

  • SHA512

    566a7036ccc924aee8b49b69c031b5e77ca85f4ff643db5c82e0ac9533a1a687c844858ae0de080dc29ecc6d74b95cc0eca50d7ccc8f158104e32d2dd241f518

  • SSDEEP

    196608:yL9vGiCff7yl3nCIjvDMjYeVa65nT84FMIZETSwjPePdrQJ/BGOqJ9Au5DYPF:yLdGiCbsSIrDMjPgQETSwvJEOqQYDQ

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Themida packer 18 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\honda.exe
    "C:\Users\Admin\AppData\Local\Temp\honda.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Users\Admin\AppData\Local\Temp\honda.exe
      "C:\Users\Admin\AppData\Local\Temp\honda.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:2104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI12602\python311.dll

    Filesize

    5.5MB

    MD5

    5a5dd7cad8028097842b0afef45bfbcf

    SHA1

    e247a2e460687c607253949c52ae2801ff35dc4a

    SHA256

    a811c7516f531f1515d10743ae78004dd627eba0dc2d3bc0d2e033b2722043ce

    SHA512

    e6268e4fad2ce3ef16b68298a57498e16f0262bf3531539ad013a66f72df471569f94c6fcc48154b7c3049a3ad15cbfcbb6345dacb4f4ed7d528c74d589c9858

  • memory/1260-1-0x0000000077790000-0x0000000077792000-memory.dmp

    Filesize

    8KB

  • memory/1260-8-0x000000013FD50000-0x000000014093D000-memory.dmp

    Filesize

    11.9MB

  • memory/1260-7-0x000000013FD50000-0x000000014093D000-memory.dmp

    Filesize

    11.9MB

  • memory/1260-6-0x000000013FD50000-0x000000014093D000-memory.dmp

    Filesize

    11.9MB

  • memory/1260-2-0x000000013FD50000-0x000000014093D000-memory.dmp

    Filesize

    11.9MB

  • memory/1260-4-0x000000013FD50000-0x000000014093D000-memory.dmp

    Filesize

    11.9MB

  • memory/1260-5-0x000000013FD50000-0x000000014093D000-memory.dmp

    Filesize

    11.9MB

  • memory/1260-30-0x0000000002880000-0x000000000346D000-memory.dmp

    Filesize

    11.9MB

  • memory/1260-3-0x000000013FD50000-0x000000014093D000-memory.dmp

    Filesize

    11.9MB

  • memory/1260-0-0x000000013FD50000-0x000000014093D000-memory.dmp

    Filesize

    11.9MB

  • memory/1260-66-0x000000013FD50000-0x000000014093D000-memory.dmp

    Filesize

    11.9MB

  • memory/2104-33-0x000000013FD50000-0x000000014093D000-memory.dmp

    Filesize

    11.9MB

  • memory/2104-32-0x000000013FD50000-0x000000014093D000-memory.dmp

    Filesize

    11.9MB

  • memory/2104-31-0x000000013FD50000-0x000000014093D000-memory.dmp

    Filesize

    11.9MB

  • memory/2104-38-0x000000013FD50000-0x000000014093D000-memory.dmp

    Filesize

    11.9MB

  • memory/2104-37-0x000000013FD50000-0x000000014093D000-memory.dmp

    Filesize

    11.9MB

  • memory/2104-34-0x000000013FD50000-0x000000014093D000-memory.dmp

    Filesize

    11.9MB

  • memory/2104-36-0x000000013FD50000-0x000000014093D000-memory.dmp

    Filesize

    11.9MB

  • memory/2104-39-0x000000013FD50000-0x000000014093D000-memory.dmp

    Filesize

    11.9MB

  • memory/2104-44-0x0000000077740000-0x00000000778E9000-memory.dmp

    Filesize

    1.7MB

  • memory/2104-43-0x000000013FD50000-0x000000014093D000-memory.dmp

    Filesize

    11.9MB

  • memory/2104-35-0x0000000077740000-0x00000000778E9000-memory.dmp

    Filesize

    1.7MB