Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 16:48
Behavioral task
behavioral1
Sample
vqyyauw.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
vqyyauw.exe
Resource
win10v2004-20241007-en
General
-
Target
vqyyauw.exe
-
Size
5.4MB
-
MD5
e882bed1df1394f65df9943cc9726e6f
-
SHA1
53a25b728bd993d12a4ff6bb5d559c40d3701816
-
SHA256
c84d35f2958824982cedc7c88c848bc4ceae2c3389365033a34a52ad0060ca4c
-
SHA512
aedb0526c29eb878c7485c899a42d1cc691dfccb1b7b16e3418ab266888e15d00a148c6201c47a0adcf1db39f24aec6a3bfea9a824702065e1ce2a3c5c9f193b
-
SSDEEP
98304:37QRplXvUQijINsV48p2DN0MvJ7mBdkH1CFYOuwn95gF+C:8rhsQijIV8p2DNjNmRFYGDgFx
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
vqyyauw.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ vqyyauw.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
vqyyauw.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vqyyauw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vqyyauw.exe -
Processes:
resource yara_rule behavioral1/memory/2644-0-0x000000013FD30000-0x0000000140A79000-memory.dmp themida behavioral1/memory/2644-13-0x000000013FD30000-0x0000000140A79000-memory.dmp themida behavioral1/memory/2644-12-0x000000013FD30000-0x0000000140A79000-memory.dmp themida behavioral1/memory/2644-11-0x000000013FD30000-0x0000000140A79000-memory.dmp themida behavioral1/memory/2644-9-0x000000013FD30000-0x0000000140A79000-memory.dmp themida behavioral1/memory/2644-10-0x000000013FD30000-0x0000000140A79000-memory.dmp themida behavioral1/memory/2644-8-0x000000013FD30000-0x0000000140A79000-memory.dmp themida behavioral1/memory/2644-14-0x000000013FD30000-0x0000000140A79000-memory.dmp themida behavioral1/memory/2644-18-0x000000013FD30000-0x0000000140A79000-memory.dmp themida -
Processes:
vqyyauw.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vqyyauw.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
vqyyauw.exepid Process 2644 vqyyauw.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
vqyyauw.exepid Process 2644 vqyyauw.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
vqyyauw.exedescription pid Process procid_target PID 2644 wrote to memory of 2676 2644 vqyyauw.exe 31 PID 2644 wrote to memory of 2676 2644 vqyyauw.exe 31 PID 2644 wrote to memory of 2676 2644 vqyyauw.exe 31 PID 2644 wrote to memory of 2780 2644 vqyyauw.exe 32 PID 2644 wrote to memory of 2780 2644 vqyyauw.exe 32 PID 2644 wrote to memory of 2780 2644 vqyyauw.exe 32 PID 2644 wrote to memory of 2684 2644 vqyyauw.exe 33 PID 2644 wrote to memory of 2684 2644 vqyyauw.exe 33 PID 2644 wrote to memory of 2684 2644 vqyyauw.exe 33 PID 2644 wrote to memory of 2556 2644 vqyyauw.exe 34 PID 2644 wrote to memory of 2556 2644 vqyyauw.exe 34 PID 2644 wrote to memory of 2556 2644 vqyyauw.exe 34 PID 2644 wrote to memory of 2916 2644 vqyyauw.exe 35 PID 2644 wrote to memory of 2916 2644 vqyyauw.exe 35 PID 2644 wrote to memory of 2916 2644 vqyyauw.exe 35 PID 2644 wrote to memory of 2668 2644 vqyyauw.exe 36 PID 2644 wrote to memory of 2668 2644 vqyyauw.exe 36 PID 2644 wrote to memory of 2668 2644 vqyyauw.exe 36 PID 2644 wrote to memory of 2584 2644 vqyyauw.exe 37 PID 2644 wrote to memory of 2584 2644 vqyyauw.exe 37 PID 2644 wrote to memory of 2584 2644 vqyyauw.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\vqyyauw.exe"C:\Users\Admin\AppData\Local\Temp\vqyyauw.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2676
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del /f dec.exe2⤵PID:2780
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2684
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del /f Binalyze.sys2⤵PID:2556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2916
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del /f epson.dll2⤵PID:2668
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5ff1d4de5bebacb1622e447501f711a2c
SHA1c288952fdfe4e2525acf49a5ed43909e790aa05d
SHA2568418186545a549643c4b8bd4d377e1cd6975bf72bdcbef3572a50098f0770e67
SHA51275090f4515a8399693c365837752e16fb1953836cd83fe4d2b98e966532fd44f0d137090a77b40223fb94db749c369876009a3006afe0a844e1704f1c88cd407
-
Filesize
297KB
MD5e6a94a064ba8d985720684b24383678e
SHA17a0b95da48f329483fc28331b608cfd2d3e46b8d
SHA256e4bb04bf7560b09fcf8043c087ed95f6a464f8e9697f7b9017a739b197ed4edb
SHA51250713482f421e30db894376626f6fc802b3ebddb0a5e744bdf6450c2259911e448db2a537d8163c833f3547d63c920eb1c8454c197a855ed7673e39c2f4e8a2a
-
Filesize
1.2MB
MD591ac5eeb4269febc570105a40ecbb47a
SHA10661aa0ebd05b3ec04bc390a4856237220a204d6
SHA256982400ec9751ad8e42a02a8fb2b0a73c91b84c74eb5b9eff4c8f45981af46774
SHA512b5cd5a061f9533eb46d0adbf816f5dbd8b03a174a3d03fe028ecf55afdccdeb258f03944c8c07b381105192b0a075ebb9f392431918060975da96c6a39f2c467