Analysis
-
max time kernel
34s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 18:54
Static task
static1
General
-
Target
2FEaKkukrgVw.exe
-
Size
13.9MB
-
MD5
a4dc525d4e27ec12e444410dfb8e3b73
-
SHA1
38e655176a8401087c9f905f2ea6f465175357af
-
SHA256
910d12b881b9874b889038f887f8d6e35028ce414341c604e4f71ee8fa13566b
-
SHA512
32c74f62ab1339e30b6dcb8cb386a09224d77dd59f2b24d1c4c162f1987ce8f0f42107cc6b82a4a1aa974576a82f5faa0e8950b4bdf6b5c958c187d397221024
-
SSDEEP
393216:IJzWUq3UKKeizYH2jBkzv7qZ/CMKGvZ/0ZtCHr:I5W1nezCTzDAC1GxvHr
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2FEaKkukrgVw.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2FEaKkukrgVw.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2FEaKkukrgVw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2FEaKkukrgVw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2FEaKkukrgVw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2FEaKkukrgVw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ldrupd.bin -
Deletes itself 1 IoCs
pid Process 2624 ldrupd.bin -
Executes dropped EXE 2 IoCs
pid Process 2624 ldrupd.bin 3932 2FEaKkukrgVw.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2FEaKkukrgVw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2FEaKkukrgVw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3932 2FEaKkukrgVw.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSystemEnvironmentPrivilege 2876 2FEaKkukrgVw.exe Token: SeSystemEnvironmentPrivilege 3932 2FEaKkukrgVw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3932 2FEaKkukrgVw.exe 3932 2FEaKkukrgVw.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2876 wrote to memory of 3524 2876 2FEaKkukrgVw.exe 86 PID 2876 wrote to memory of 3524 2876 2FEaKkukrgVw.exe 86 PID 2876 wrote to memory of 3524 2876 2FEaKkukrgVw.exe 86 PID 2876 wrote to memory of 820 2876 2FEaKkukrgVw.exe 87 PID 2876 wrote to memory of 820 2876 2FEaKkukrgVw.exe 87 PID 2876 wrote to memory of 820 2876 2FEaKkukrgVw.exe 87 PID 2876 wrote to memory of 2624 2876 2FEaKkukrgVw.exe 88 PID 2876 wrote to memory of 2624 2876 2FEaKkukrgVw.exe 88 PID 2624 wrote to memory of 3932 2624 ldrupd.bin 89 PID 2624 wrote to memory of 3932 2624 ldrupd.bin 89 PID 3932 wrote to memory of 3504 3932 2FEaKkukrgVw.exe 95 PID 3932 wrote to memory of 3504 3932 2FEaKkukrgVw.exe 95 PID 3932 wrote to memory of 3504 3932 2FEaKkukrgVw.exe 95 PID 3932 wrote to memory of 2336 3932 2FEaKkukrgVw.exe 96 PID 3932 wrote to memory of 2336 3932 2FEaKkukrgVw.exe 96 PID 3932 wrote to memory of 2336 3932 2FEaKkukrgVw.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2FEaKkukrgVw.exe"C:\Users\Admin\AppData\Local\Temp\2FEaKkukrgVw.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵PID:3524
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵PID:820
-
-
C:\Users\Admin\AppData\Local\ldrupd.bin"C:\Users\Admin\AppData\Local\ldrupd.bin"2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\2FEaKkukrgVw.exe"C:\Users\Admin\AppData\Local\Temp\2FEaKkukrgVw.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"4⤵PID:3504
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"4⤵PID:2336
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15.8MB
MD51daf114a9a19553a9843afc8bd2e899a
SHA1716b13e7b8ab4ffadd8769722a45f793de6a20ff
SHA256cc254be082e662e65ea2edcde4b4eaa7bbbdf3b7f08a19c2e51832d1c232fdd0
SHA512ea871cb07ab89647e393292034a35f39df4501a860e376b5f9cd10bf17c47f167a4c299c2f951c7ff03876937f94b0e036f11eaeeadf7f86e41bbbf50a824d41
-
Filesize
3KB
MD5a24978a6b77e2cd99823e24c6eb4d055
SHA105aab593ba8e0c21f2859d04d4810fdd1ce453c3
SHA25680ac94c086eb6e52bc3bbebd86e0795f6cb7476153af0c767b9ae4b7e9931140
SHA51224356ce42d0fd7839166416604fd7bd101cab8754de095676c921bfb664bc110e8a87cb863afefb5fd98450496c1b3e303851943f13a3e19f206350239c2a8db