Analysis
-
max time kernel
21s -
max time network
22s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 05:04
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
loader.exe
-
Size
19.9MB
-
MD5
de056f7f395b63cfc41101107663bcad
-
SHA1
6e0aab67abf2aa4ccc75aa00b443050b59f207b5
-
SHA256
e42a2e4a584d4e2206228b4f32c97f97655380d53eb7157df7b9ff53b01ae0db
-
SHA512
afd6e680b5103ba92ee302b948d16881076e49b5e9f3f2265cb0f2d9510a4c438a386eebca67097019a4dfea0eeb0b62252d49a1d4f005174c7d78e797a3330c
-
SSDEEP
393216:87uQYxu8HPWE2UDeYBmv6Tk7xsZQLbX8G8gPpbnZ7Z0VVCreXX6iEMAtU3B6E2KX:au9xVvWqmQkagvPVZ7WVVCrSXbp0GB68
Malware Config
Signatures
-
Remcos family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ loader.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion loader.exe -
resource yara_rule behavioral1/memory/2684-0-0x000000013FE00000-0x0000000142059000-memory.dmp themida behavioral1/memory/2684-3-0x000000013FE00000-0x0000000142059000-memory.dmp themida behavioral1/memory/2684-2-0x000000013FE00000-0x0000000142059000-memory.dmp themida behavioral1/memory/2684-4-0x000000013FE00000-0x0000000142059000-memory.dmp themida behavioral1/memory/2684-6-0x000000013FE00000-0x0000000142059000-memory.dmp themida behavioral1/memory/2684-5-0x000000013FE00000-0x0000000142059000-memory.dmp themida behavioral1/memory/2684-8-0x000000013FE00000-0x0000000142059000-memory.dmp themida behavioral1/memory/2684-7-0x000000013FE00000-0x0000000142059000-memory.dmp themida behavioral1/memory/2684-9-0x000000013FE00000-0x0000000142059000-memory.dmp themida behavioral1/memory/2684-11-0x000000013FE00000-0x0000000142059000-memory.dmp themida behavioral1/memory/2684-10-0x000000013FE00000-0x0000000142059000-memory.dmp themida behavioral1/memory/2684-13-0x000000013FE00000-0x0000000142059000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA loader.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2684 loader.exe