Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 20:10
Behavioral task
behavioral1
Sample
Precise Temp.exe
Resource
win7-20240903-en
General
-
Target
Precise Temp.exe
-
Size
4.5MB
-
MD5
6509b704aa9ebb7452bc4a77b18a9e9e
-
SHA1
91bb981b702e16913af49a0e59f64da025bb3af8
-
SHA256
86e6fab2b9c9a219365a962076ddb69f947ec1f35e971703b0ed6cb4da528225
-
SHA512
38e6e578f262afe2ecdeedb1bb5103f68c9a61714eb71a494578ff104a2195fca4176e2820c786b7f2907fd6d7ed655684cbf558fed829b445efc6a8b734bfdb
-
SSDEEP
98304:TX+roAWebtAIaAgq9uAmb7YJrr9/xFJ4E1ZI+9dUbEhP1X:yrxZtXadOG+Pzh
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Precise Temp.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Precise Temp.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Precise Temp.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Precise Temp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Precise Temp.exe -
Processes:
resource yara_rule behavioral1/memory/2420-26-0x0000000000400000-0x0000000000E3E000-memory.dmp themida behavioral1/memory/2420-27-0x0000000000400000-0x0000000000E3E000-memory.dmp themida behavioral1/memory/2420-34-0x0000000000400000-0x0000000000E3E000-memory.dmp themida -
Processes:
Precise Temp.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Precise Temp.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Precise Temp.exepid process 2420 Precise Temp.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2244 2420 WerFault.exe Precise Temp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Precise Temp.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Precise Temp.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Precise Temp.exepid process 2420 Precise Temp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Precise Temp.exedescription pid process target process PID 2420 wrote to memory of 2244 2420 Precise Temp.exe WerFault.exe PID 2420 wrote to memory of 2244 2420 Precise Temp.exe WerFault.exe PID 2420 wrote to memory of 2244 2420 Precise Temp.exe WerFault.exe PID 2420 wrote to memory of 2244 2420 Precise Temp.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Precise Temp.exe"C:\Users\Admin\AppData\Local\Temp\Precise Temp.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 6282⤵
- Program crash
PID:2244
-