Analysis
-
max time kernel
131s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 12:18
Behavioral task
behavioral1
Sample
NetLimiterKeygenv1.3.exe
Resource
win7-20241010-en
General
-
Target
NetLimiterKeygenv1.3.exe
-
Size
3.8MB
-
MD5
403ce52e780c06d2869145ad4461b567
-
SHA1
026dab4630eaf49c77944cd8bbebd8f506e979bb
-
SHA256
124e9a0fb03fceb4dd2ed5820c5a8d8381a2bfe6922a6cf8b630c29d3bef564a
-
SHA512
34f7ecb0b6464d93f12050e4044fc3d779c71ac5c41666f76c6085d743515e3cb8b4720a4ed525bd6c07d211c0806d28dadb7739ef227890d78f558562c5a10a
-
SSDEEP
98304:Zo6iM+KzBm3CsCd/EIHl+yIKSJlF+qtFD03Miv0s:Zo9M+KVmod/EIF7IzlFtWMi8
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ NetLimiterKeygenv1.3.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion NetLimiterKeygenv1.3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion NetLimiterKeygenv1.3.exe -
Loads dropped DLL 2 IoCs
pid Process 2220 NetLimiterKeygenv1.3.exe 2220 NetLimiterKeygenv1.3.exe -
resource yara_rule behavioral1/memory/2220-30-0x00000000012D0000-0x0000000001C28000-memory.dmp themida behavioral1/memory/2220-31-0x00000000012D0000-0x0000000001C28000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NetLimiterKeygenv1.3.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\bassmod.dll NetLimiterKeygenv1.3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2220 NetLimiterKeygenv1.3.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NetLimiterKeygenv1.3.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2220 NetLimiterKeygenv1.3.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2740 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2740 AUDIODG.EXE Token: 33 2740 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2740 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\NetLimiterKeygenv1.3.exe"C:\Users\Admin\AppData\Local\Temp\NetLimiterKeygenv1.3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5e01⤵
- Suspicious use of AdjustPrivilegeToken
PID:2740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD536fde2466fea08328edb8744ee01981e
SHA1c651bd011af3a1292ba8e59663c4018c17ef1291
SHA256ac3d757539af3ac2103803f5f058fcf05d4082498dcb02f42ebf322a5ac9d9d6
SHA51252b36430d07f5f3d20c9c4f054e368d730c2e3389231ea43c8da5cd343e51e7630f20e0096f069f815d3477c67b5b98b3bdb899871236cc02d0670642dd448f1
-
Filesize
33KB
MD5e4ec57e8508c5c4040383ebe6d367928
SHA1b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06
SHA2568ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f
SHA51277d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822