Overview
overview
9Static
static
71a4b5d8c8a...c7.exe
windows7-x64
91a4b5d8c8a...c7.exe
windows10-2004-x64
9$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PROGRAMFI...it.dll
windows7-x64
3$PROGRAMFI...it.dll
windows10-2004-x64
3$PROGRAMFI...ge.dll
windows7-x64
3$PROGRAMFI...ge.dll
windows10-2004-x64
3$PROGRAMFI...er.dll
windows7-x64
3$PROGRAMFI...er.dll
windows10-2004-x64
3remedy.exe
windows7-x64
9remedy.exe
windows10-2004-x64
9simityvp.exe
windows7-x64
9simityvp.exe
windows10-2004-x64
9Analysis
-
max time kernel
111s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 14:28
Behavioral task
behavioral1
Sample
1a4b5d8c8adf2cac325be642c101f223102145b818546d497d71390104b180c7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1a4b5d8c8adf2cac325be642c101f223102145b818546d497d71390104b180c7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
remedy.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
remedy.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
simityvp.exe
Resource
win7-20240903-en
General
-
Target
remedy.exe
-
Size
3.3MB
-
MD5
a549bfe1170323076f438b7199bd39da
-
SHA1
fb893bcde83c6a8544276f464f03ec762cd3ca0a
-
SHA256
10a7145031d494fa4b85a71bf01ada3362ce77cd94dc8f6bd7c0afcf7797aac8
-
SHA512
469a623678fe783cac684b61431b8694f88cb23cf048df3e2d3e0f7955f92f79dcc58de03788d7a34c6ec7e9511c0902f72e8484ccf2834bb4275d362d81ceda
-
SSDEEP
98304:nUxwcPkH5x8SBBAnsj0b5MDcTSsvU44fKVr:UxCx+nsj0b5MwesM4MKV
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
remedy.exeIntelRapid.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ remedy.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ IntelRapid.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
remedy.exeIntelRapid.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion remedy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion remedy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IntelRapid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IntelRapid.exe -
Drops startup file 1 IoCs
Processes:
remedy.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelRapid.lnk remedy.exe -
Executes dropped EXE 1 IoCs
Processes:
IntelRapid.exepid process 2764 IntelRapid.exe -
Processes:
resource yara_rule behavioral18/memory/1784-0-0x00007FF7CE7C0000-0x00007FF7CF0D8000-memory.dmp themida behavioral18/memory/1784-3-0x00007FF7CE7C0000-0x00007FF7CF0D8000-memory.dmp themida behavioral18/memory/1784-4-0x00007FF7CE7C0000-0x00007FF7CF0D8000-memory.dmp themida behavioral18/memory/1784-2-0x00007FF7CE7C0000-0x00007FF7CF0D8000-memory.dmp themida C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida behavioral18/memory/2764-15-0x00007FF7FAEA0000-0x00007FF7FB7B8000-memory.dmp themida behavioral18/memory/2764-17-0x00007FF7FAEA0000-0x00007FF7FB7B8000-memory.dmp themida behavioral18/memory/2764-14-0x00007FF7FAEA0000-0x00007FF7FB7B8000-memory.dmp themida behavioral18/memory/1784-13-0x00007FF7CE7C0000-0x00007FF7CF0D8000-memory.dmp themida behavioral18/memory/2764-18-0x00007FF7FAEA0000-0x00007FF7FB7B8000-memory.dmp themida behavioral18/memory/2764-19-0x00007FF7FAEA0000-0x00007FF7FB7B8000-memory.dmp themida behavioral18/memory/2764-25-0x00007FF7FAEA0000-0x00007FF7FB7B8000-memory.dmp themida -
Processes:
remedy.exeIntelRapid.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA remedy.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IntelRapid.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
remedy.exeIntelRapid.exepid process 1784 remedy.exe 2764 IntelRapid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
IntelRapid.exepid process 2764 IntelRapid.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
remedy.exedescription pid process target process PID 1784 wrote to memory of 2764 1784 remedy.exe IntelRapid.exe PID 1784 wrote to memory of 2764 1784 remedy.exe IntelRapid.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\remedy.exe"C:\Users\Admin\AppData\Local\Temp\remedy.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD5a549bfe1170323076f438b7199bd39da
SHA1fb893bcde83c6a8544276f464f03ec762cd3ca0a
SHA25610a7145031d494fa4b85a71bf01ada3362ce77cd94dc8f6bd7c0afcf7797aac8
SHA512469a623678fe783cac684b61431b8694f88cb23cf048df3e2d3e0f7955f92f79dcc58de03788d7a34c6ec7e9511c0902f72e8484ccf2834bb4275d362d81ceda