Analysis
-
max time kernel
36s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 05:04
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
loader.exe
-
Size
19.9MB
-
MD5
de056f7f395b63cfc41101107663bcad
-
SHA1
6e0aab67abf2aa4ccc75aa00b443050b59f207b5
-
SHA256
e42a2e4a584d4e2206228b4f32c97f97655380d53eb7157df7b9ff53b01ae0db
-
SHA512
afd6e680b5103ba92ee302b948d16881076e49b5e9f3f2265cb0f2d9510a4c438a386eebca67097019a4dfea0eeb0b62252d49a1d4f005174c7d78e797a3330c
-
SSDEEP
393216:87uQYxu8HPWE2UDeYBmv6Tk7xsZQLbX8G8gPpbnZ7Z0VVCreXX6iEMAtU3B6E2KX:au9xVvWqmQkagvPVZ7WVVCrSXbp0GB68
Malware Config
Signatures
-
Remcos family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ loader.exe -
Creates new service(s) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion loader.exe -
resource yara_rule behavioral2/memory/4868-0-0x00007FF73BD20000-0x00007FF73DF79000-memory.dmp themida behavioral2/memory/4868-2-0x00007FF73BD20000-0x00007FF73DF79000-memory.dmp themida behavioral2/memory/4868-3-0x00007FF73BD20000-0x00007FF73DF79000-memory.dmp themida behavioral2/memory/4868-4-0x00007FF73BD20000-0x00007FF73DF79000-memory.dmp themida behavioral2/memory/4868-5-0x00007FF73BD20000-0x00007FF73DF79000-memory.dmp themida behavioral2/memory/4868-6-0x00007FF73BD20000-0x00007FF73DF79000-memory.dmp themida behavioral2/memory/4868-8-0x00007FF73BD20000-0x00007FF73DF79000-memory.dmp themida behavioral2/memory/4868-7-0x00007FF73BD20000-0x00007FF73DF79000-memory.dmp themida behavioral2/memory/4868-9-0x00007FF73BD20000-0x00007FF73DF79000-memory.dmp themida behavioral2/memory/4868-10-0x00007FF73BD20000-0x00007FF73DF79000-memory.dmp themida behavioral2/memory/4868-11-0x00007FF73BD20000-0x00007FF73DF79000-memory.dmp themida behavioral2/memory/4868-12-0x00007FF73BD20000-0x00007FF73DF79000-memory.dmp themida behavioral2/memory/4868-15-0x00007FF73BD20000-0x00007FF73DF79000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA loader.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\WinKEStack.sys loader.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4868 loader.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3404 sc.exe 4668 sc.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4452 4868 loader.exe 98 PID 4868 wrote to memory of 4452 4868 loader.exe 98 PID 4868 wrote to memory of 3704 4868 loader.exe 99 PID 4868 wrote to memory of 3704 4868 loader.exe 99 PID 3704 wrote to memory of 3404 3704 cmd.exe 100 PID 3704 wrote to memory of 3404 3704 cmd.exe 100 PID 4868 wrote to memory of 2124 4868 loader.exe 101 PID 4868 wrote to memory of 2124 4868 loader.exe 101 PID 2124 wrote to memory of 4668 2124 cmd.exe 102 PID 2124 wrote to memory of 4668 2124 cmd.exe 102 PID 4868 wrote to memory of 2672 4868 loader.exe 103 PID 4868 wrote to memory of 2672 4868 loader.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc create WinKEStack binpath="C:\Windows\System32\WinKEStack.sys" type="kernel"2⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\system32\sc.exesc create WinKEStack binpath="C:\Windows\System32\WinKEStack.sys" type="kernel"3⤵
- Launches sc.exe
PID:3404
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc start WinKEStack2⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\system32\sc.exesc start WinKEStack3⤵
- Launches sc.exe
PID:4668
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2672
-