Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 16:48
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
loader.exe
Resource
win10v2004-20241007-en
General
-
Target
loader.exe
-
Size
18.8MB
-
MD5
8bba02b9071196c8b1681eb086e699b3
-
SHA1
adc78b8c976c3e9f52f57c760b3047e3c91fb389
-
SHA256
85a8fb1a3141fdca3588330bd8945a8775af26f0a145ed61e68bcd351915b25a
-
SHA512
06aa6c03a256489039276ee091ef346112ad7a225b97fac803f8288f927a65fc68d7f3421c3e8bf9d82236d6805688d40a5ba5bce2ea61821867edccebbc3436
-
SSDEEP
393216:MxsYJZy/ER2j9dkgZ3lNQdTVng6//XWIDCF/BilP+U7AY5zE3qsw5:MxDy/ZrQFVnZ3XWQCNBil2U7AY5zEu
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
loader.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ loader.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
loader.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion loader.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 3060 cmd.exe -
Processes:
resource yara_rule behavioral1/memory/2908-0-0x000000013FA30000-0x0000000142E7C000-memory.dmp themida behavioral1/memory/2908-2-0x000000013FA30000-0x0000000142E7C000-memory.dmp themida behavioral1/memory/2908-4-0x000000013FA30000-0x0000000142E7C000-memory.dmp themida behavioral1/memory/2908-3-0x000000013FA30000-0x0000000142E7C000-memory.dmp themida behavioral1/memory/2908-5-0x000000013FA30000-0x0000000142E7C000-memory.dmp themida behavioral1/memory/2908-7-0x000000013FA30000-0x0000000142E7C000-memory.dmp themida behavioral1/memory/2908-8-0x000000013FA30000-0x0000000142E7C000-memory.dmp themida behavioral1/memory/2908-6-0x000000013FA30000-0x0000000142E7C000-memory.dmp themida behavioral1/memory/2908-10-0x000000013FA30000-0x0000000142E7C000-memory.dmp themida behavioral1/memory/2908-11-0x000000013FA30000-0x0000000142E7C000-memory.dmp themida behavioral1/memory/2908-15-0x000000013FA30000-0x0000000142E7C000-memory.dmp themida -
Processes:
loader.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA loader.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
loader.exepid process 2908 loader.exe 2908 loader.exe 2908 loader.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 15 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exedescription ioc process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1612 timeout.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 988 ipconfig.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1720 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
taskmgr.exepid process 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 1664 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
taskkill.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 1720 taskkill.exe Token: SeDebugPrivilege 1664 taskmgr.exe -
Suspicious use of FindShellTrayWindow 45 IoCs
Processes:
taskmgr.exepid process 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe -
Suspicious use of SendNotifyMessage 45 IoCs
Processes:
taskmgr.exepid process 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe 1664 taskmgr.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
loader.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2908 wrote to memory of 2516 2908 loader.exe cmd.exe PID 2908 wrote to memory of 2516 2908 loader.exe cmd.exe PID 2908 wrote to memory of 2516 2908 loader.exe cmd.exe PID 2516 wrote to memory of 988 2516 cmd.exe ipconfig.exe PID 2516 wrote to memory of 988 2516 cmd.exe ipconfig.exe PID 2516 wrote to memory of 988 2516 cmd.exe ipconfig.exe PID 2908 wrote to memory of 544 2908 loader.exe cmd.exe PID 2908 wrote to memory of 544 2908 loader.exe cmd.exe PID 2908 wrote to memory of 544 2908 loader.exe cmd.exe PID 544 wrote to memory of 2156 544 cmd.exe netsh.exe PID 544 wrote to memory of 2156 544 cmd.exe netsh.exe PID 544 wrote to memory of 2156 544 cmd.exe netsh.exe PID 2908 wrote to memory of 2976 2908 loader.exe cmd.exe PID 2908 wrote to memory of 2976 2908 loader.exe cmd.exe PID 2908 wrote to memory of 2976 2908 loader.exe cmd.exe PID 2976 wrote to memory of 2840 2976 cmd.exe certutil.exe PID 2976 wrote to memory of 2840 2976 cmd.exe certutil.exe PID 2976 wrote to memory of 2840 2976 cmd.exe certutil.exe PID 2908 wrote to memory of 2984 2908 loader.exe cmd.exe PID 2908 wrote to memory of 2984 2908 loader.exe cmd.exe PID 2908 wrote to memory of 2984 2908 loader.exe cmd.exe PID 2984 wrote to memory of 2836 2984 cmd.exe netsh.exe PID 2984 wrote to memory of 2836 2984 cmd.exe netsh.exe PID 2984 wrote to memory of 2836 2984 cmd.exe netsh.exe PID 2908 wrote to memory of 2828 2908 loader.exe cmd.exe PID 2908 wrote to memory of 2828 2908 loader.exe cmd.exe PID 2908 wrote to memory of 2828 2908 loader.exe cmd.exe PID 2828 wrote to memory of 2816 2828 cmd.exe netsh.exe PID 2828 wrote to memory of 2816 2828 cmd.exe netsh.exe PID 2828 wrote to memory of 2816 2828 cmd.exe netsh.exe PID 2908 wrote to memory of 2580 2908 loader.exe cmd.exe PID 2908 wrote to memory of 2580 2908 loader.exe cmd.exe PID 2908 wrote to memory of 2580 2908 loader.exe cmd.exe PID 2580 wrote to memory of 2788 2580 cmd.exe netsh.exe PID 2580 wrote to memory of 2788 2580 cmd.exe netsh.exe PID 2580 wrote to memory of 2788 2580 cmd.exe netsh.exe PID 2908 wrote to memory of 2612 2908 loader.exe cmd.exe PID 2908 wrote to memory of 2612 2908 loader.exe cmd.exe PID 2908 wrote to memory of 2612 2908 loader.exe cmd.exe PID 2612 wrote to memory of 2648 2612 cmd.exe netsh.exe PID 2612 wrote to memory of 2648 2612 cmd.exe netsh.exe PID 2612 wrote to memory of 2648 2612 cmd.exe netsh.exe PID 2908 wrote to memory of 3060 2908 loader.exe cmd.exe PID 2908 wrote to memory of 3060 2908 loader.exe cmd.exe PID 2908 wrote to memory of 3060 2908 loader.exe cmd.exe PID 3060 wrote to memory of 1612 3060 cmd.exe timeout.exe PID 3060 wrote to memory of 1612 3060 cmd.exe timeout.exe PID 3060 wrote to memory of 1612 3060 cmd.exe timeout.exe PID 3060 wrote to memory of 1720 3060 cmd.exe taskkill.exe PID 3060 wrote to memory of 1720 3060 cmd.exe taskkill.exe PID 3060 wrote to memory of 1720 3060 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\system32\cmd.exe/c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\system32\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:988
-
-
-
C:\Windows\system32\cmd.exe/c netsh interface ip delete arpcache2⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\system32\netsh.exenetsh interface ip delete arpcache3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2156
-
-
-
C:\Windows\system32\cmd.exe/c certutil -URLCache * delete2⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\system32\certutil.execertutil -URLCache * delete3⤵PID:2840
-
-
-
C:\Windows\system32\cmd.exe/c netsh int ip reset2⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\system32\netsh.exenetsh int ip reset3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2836
-
-
-
C:\Windows\system32\cmd.exe/c netsh int ipv4 reset2⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\system32\netsh.exenetsh int ipv4 reset3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2816
-
-
-
C:\Windows\system32\cmd.exe/c netsh int ipv6 reset2⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\system32\netsh.exenetsh int ipv6 reset3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2788
-
-
-
C:\Windows\system32\cmd.exe/c netsh winsock reset2⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\system32\netsh.exenetsh winsock reset3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2648
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout /T 1 /NOBREAK > Nul & taskkill /F /IM "loader.exe" & Del /f /q "C:\Users\Admin\AppData\Local\Temp\loader.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\system32\timeout.exetimeout /T 1 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:1612
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM "loader.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1664