Overview
overview
9Static
static
76c7ec50485...d2.exe
windows7-x64
96c7ec50485...d2.exe
windows10-2004-x64
9$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PROGRAMFI...it.dll
windows7-x64
3$PROGRAMFI...it.dll
windows10-2004-x64
3$PROGRAMFI...ge.dll
windows7-x64
3$PROGRAMFI...ge.dll
windows10-2004-x64
3$PROGRAMFI...er.dll
windows7-x64
3$PROGRAMFI...er.dll
windows10-2004-x64
3remedy.exe
windows7-x64
9remedy.exe
windows10-2004-x64
9simityvp.exe
windows7-x64
9simityvp.exe
windows10-2004-x64
9Analysis
-
max time kernel
111s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 17:36
Behavioral task
behavioral1
Sample
6c7ec50485943ef850a67df20d7903522566f00e16506c1c03a772b9dc6bebd2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6c7ec50485943ef850a67df20d7903522566f00e16506c1c03a772b9dc6bebd2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
remedy.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
remedy.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
simityvp.exe
Resource
win7-20240903-en
General
-
Target
remedy.exe
-
Size
3.5MB
-
MD5
163219e1c4f789b48114bc15e4fc598e
-
SHA1
e9cb9216bb0c52c8c77314c7a68381f46865dacc
-
SHA256
0bab70088222eb4e9ca0a4b40e6a5476575396af88be6796e856b2d640c32724
-
SHA512
176a80700127f07790586863827bda4da21439647c57ab8857d124b142f0eb9682ee57c1ea7d83c2372389fb5f35e068eb77385c0e9eac574c8363b6d2e3d8e6
-
SSDEEP
98304:8afLxoNrXcY9vY5xVUAMcj8drwf7BYnO2wGG8:VzxodXcY9vYrVUpcwdrwVBGX
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
remedy.exeIntelRapid.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ remedy.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ IntelRapid.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
remedy.exeIntelRapid.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion remedy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion remedy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IntelRapid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IntelRapid.exe -
Drops startup file 1 IoCs
Processes:
remedy.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelRapid.lnk remedy.exe -
Executes dropped EXE 1 IoCs
Processes:
IntelRapid.exepid process 4032 IntelRapid.exe -
Processes:
resource yara_rule behavioral18/memory/4752-0-0x00007FF690290000-0x00007FF690BFF000-memory.dmp themida behavioral18/memory/4752-2-0x00007FF690290000-0x00007FF690BFF000-memory.dmp themida behavioral18/memory/4752-3-0x00007FF690290000-0x00007FF690BFF000-memory.dmp themida behavioral18/memory/4752-4-0x00007FF690290000-0x00007FF690BFF000-memory.dmp themida C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida behavioral18/memory/4032-12-0x00007FF666EC0000-0x00007FF66782F000-memory.dmp themida behavioral18/memory/4752-13-0x00007FF690290000-0x00007FF690BFF000-memory.dmp themida behavioral18/memory/4032-14-0x00007FF666EC0000-0x00007FF66782F000-memory.dmp themida behavioral18/memory/4032-16-0x00007FF666EC0000-0x00007FF66782F000-memory.dmp themida behavioral18/memory/4032-17-0x00007FF666EC0000-0x00007FF66782F000-memory.dmp themida behavioral18/memory/4032-18-0x00007FF666EC0000-0x00007FF66782F000-memory.dmp themida behavioral18/memory/4032-24-0x00007FF666EC0000-0x00007FF66782F000-memory.dmp themida -
Processes:
remedy.exeIntelRapid.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA remedy.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IntelRapid.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
remedy.exeIntelRapid.exepid process 4752 remedy.exe 4032 IntelRapid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
IntelRapid.exepid process 4032 IntelRapid.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
remedy.exedescription pid process target process PID 4752 wrote to memory of 4032 4752 remedy.exe IntelRapid.exe PID 4752 wrote to memory of 4032 4752 remedy.exe IntelRapid.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\remedy.exe"C:\Users\Admin\AppData\Local\Temp\remedy.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
PID:4032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5163219e1c4f789b48114bc15e4fc598e
SHA1e9cb9216bb0c52c8c77314c7a68381f46865dacc
SHA2560bab70088222eb4e9ca0a4b40e6a5476575396af88be6796e856b2d640c32724
SHA512176a80700127f07790586863827bda4da21439647c57ab8857d124b142f0eb9682ee57c1ea7d83c2372389fb5f35e068eb77385c0e9eac574c8363b6d2e3d8e6