Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/12/2024, 13:38
Behavioral task
behavioral1
Sample
loader1.exe
Resource
win7-20240903-en
8 signatures
150 seconds
General
-
Target
loader1.exe
-
Size
19.6MB
-
MD5
fcfb2668c205cf6b25b256420ace004e
-
SHA1
b3b696adff3cc0fc12f027347b582aa9cd7d5f20
-
SHA256
4e3931657ed3103acf45c9356d5ef5648298cbfc5d11f8dd407b94e776c14fd5
-
SHA512
9c577770ca4de729fb55420936802a21f02a765404e7faffc17aaa25bfee45bdfe8e606e0255530f3d01276c3729d285df748790449531eca5e6a393f1440297
-
SSDEEP
393216:vNVL8SLSsbPpiZ8XtX64nYjRG3CA8d6i67sYppz6cvt2dL:1VLxTp2etX2Y3id45pz8L
Malware Config
Signatures
-
Remcos family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ loader1.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion loader1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion loader1.exe -
resource yara_rule behavioral1/memory/2384-0-0x000000013FDE0000-0x0000000141F8B000-memory.dmp themida behavioral1/memory/2384-3-0x000000013FDE0000-0x0000000141F8B000-memory.dmp themida behavioral1/memory/2384-2-0x000000013FDE0000-0x0000000141F8B000-memory.dmp themida behavioral1/memory/2384-5-0x000000013FDE0000-0x0000000141F8B000-memory.dmp themida behavioral1/memory/2384-7-0x000000013FDE0000-0x0000000141F8B000-memory.dmp themida behavioral1/memory/2384-4-0x000000013FDE0000-0x0000000141F8B000-memory.dmp themida behavioral1/memory/2384-9-0x000000013FDE0000-0x0000000141F8B000-memory.dmp themida behavioral1/memory/2384-8-0x000000013FDE0000-0x0000000141F8B000-memory.dmp themida behavioral1/memory/2384-6-0x000000013FDE0000-0x0000000141F8B000-memory.dmp themida behavioral1/memory/2384-10-0x000000013FDE0000-0x0000000141F8B000-memory.dmp themida behavioral1/memory/2384-11-0x000000013FDE0000-0x0000000141F8B000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA loader1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2384 loader1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2384 wrote to memory of 264 2384 loader1.exe 31 PID 2384 wrote to memory of 264 2384 loader1.exe 31 PID 2384 wrote to memory of 264 2384 loader1.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader1.exe"C:\Users\Admin\AppData\Local\Temp\loader1.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:264
-