Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 16:30

General

  • Target

    3a48bb3fcdd6733462d837d755c7f09f90399d57364bae905f130009112a8945.exe

  • Size

    684.8MB

  • MD5

    cffbeaff6728b94b1157790a0da8c0e0

  • SHA1

    f739e01d798ee1f1c8802daf661fe22a2dc6cb85

  • SHA256

    3a48bb3fcdd6733462d837d755c7f09f90399d57364bae905f130009112a8945

  • SHA512

    afdcc11c9fff4cca1d14d326d4728b3032617b62c2b9ad788b2e78383831cc0240ce0bf428b43e17ef0cb222ccacc99f58ab8b1e9c77804bcaf9bc0033375b76

  • SSDEEP

    98304:G9J/BDT4RZr3mc9UUxFKzxx+SjEnodrlW3hvIroVj0Rdfay6cysWtrW4L:e/9Y3n9UiFe+SWodrlW3HVURp7Wtas

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a48bb3fcdd6733462d837d755c7f09f90399d57364bae905f130009112a8945.exe
    "C:\Users\Admin\AppData\Local\Temp\3a48bb3fcdd6733462d837d755c7f09f90399d57364bae905f130009112a8945.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2668 -s 532
      2⤵
        PID:2688

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2668-0-0x0000000000DF0000-0x000000000191C000-memory.dmp

      Filesize

      11.2MB

    • memory/2668-1-0x000007FEFDB93000-0x000007FEFDB94000-memory.dmp

      Filesize

      4KB

    • memory/2668-2-0x000007FEFDB80000-0x000007FEFDBEC000-memory.dmp

      Filesize

      432KB

    • memory/2668-3-0x0000000000DF0000-0x000000000191C000-memory.dmp

      Filesize

      11.2MB

    • memory/2668-5-0x000007FEFDB80000-0x000007FEFDBEC000-memory.dmp

      Filesize

      432KB

    • memory/2668-6-0x000007FEFDB80000-0x000007FEFDBEC000-memory.dmp

      Filesize

      432KB

    • memory/2668-7-0x000007FEFDB93000-0x000007FEFDB94000-memory.dmp

      Filesize

      4KB

    • memory/2668-8-0x000007FEFDB80000-0x000007FEFDBEC000-memory.dmp

      Filesize

      432KB

    • memory/2668-9-0x0000000000DF0000-0x000000000191C000-memory.dmp

      Filesize

      11.2MB

    • memory/2668-10-0x0000000000DF0000-0x000000000191C000-memory.dmp

      Filesize

      11.2MB

    • memory/2668-11-0x000007FEFDB80000-0x000007FEFDBEC000-memory.dmp

      Filesize

      432KB

    • memory/2668-13-0x0000000000DF0000-0x000000000191C000-memory.dmp

      Filesize

      11.2MB