Analysis
-
max time kernel
41s -
max time network
22s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 05:13
Behavioral task
behavioral1
Sample
bo.exe
Resource
win7-20240729-en
windows7-x64
8 signatures
150 seconds
General
-
Target
bo.exe
-
Size
19.4MB
-
MD5
d11df1a50d4bd2946f22579a59c42533
-
SHA1
642658e79c5efcfdf1ece6b24f677868e2e5242b
-
SHA256
c284436ac848ee2ff093e35b1b1a3b75e137adff13c2d3cb070192cd3851bfcd
-
SHA512
0dbe240d77a2e51198e942f0b48dc92f2d3c40f7eac98f957ede80f5809d4efff24a62f7f10e826b70b1459842391a880c39ab651b53809d4a0451778a04fb66
-
SSDEEP
393216:V7HMp6xoUGEbCqiYXygxbisWLvhVARbpQgz+exD9ydNwbOVJs:VzMUWUxCD2nZi9vhVAx1+UDAvwbOw
Malware Config
Signatures
-
Remcos family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
bo.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bo.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
bo.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bo.exe -
Processes:
resource yara_rule behavioral1/memory/1880-0-0x000000013F140000-0x00000001412BA000-memory.dmp themida behavioral1/memory/1880-2-0x000000013F140000-0x00000001412BA000-memory.dmp themida behavioral1/memory/1880-3-0x000000013F140000-0x00000001412BA000-memory.dmp themida behavioral1/memory/1880-5-0x000000013F140000-0x00000001412BA000-memory.dmp themida behavioral1/memory/1880-7-0x000000013F140000-0x00000001412BA000-memory.dmp themida behavioral1/memory/1880-6-0x000000013F140000-0x00000001412BA000-memory.dmp themida behavioral1/memory/1880-4-0x000000013F140000-0x00000001412BA000-memory.dmp themida behavioral1/memory/1880-9-0x000000013F140000-0x00000001412BA000-memory.dmp themida behavioral1/memory/1880-8-0x000000013F140000-0x00000001412BA000-memory.dmp themida behavioral1/memory/1880-10-0x000000013F140000-0x00000001412BA000-memory.dmp themida behavioral1/memory/1880-11-0x000000013F140000-0x00000001412BA000-memory.dmp themida behavioral1/memory/1880-13-0x000000013F140000-0x00000001412BA000-memory.dmp themida behavioral1/memory/1880-14-0x000000013F140000-0x00000001412BA000-memory.dmp themida behavioral1/memory/1880-15-0x000000013F140000-0x00000001412BA000-memory.dmp themida -
Processes:
bo.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bo.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
bo.exepid Process 1880 bo.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
bo.exedescription pid Process procid_target PID 1880 wrote to memory of 2712 1880 bo.exe 33 PID 1880 wrote to memory of 2712 1880 bo.exe 33 PID 1880 wrote to memory of 2712 1880 bo.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\bo.exe"C:\Users\Admin\AppData\Local\Temp\bo.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit2⤵PID:2712
-