Analysis
-
max time kernel
151s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-02-2025 21:46
Behavioral task
behavioral1
Sample
HWIDPERM.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
HWIDPERM.exe
Resource
win10v2004-20250217-en
General
-
Target
HWIDPERM.exe
-
Size
5.6MB
-
MD5
0174f56a8332b4584ba7c5e0613ee5cb
-
SHA1
447a233cf7b6f6a69abfcf5dc92d07d4de9dfd95
-
SHA256
f89692039499443e03edad55335a05451c18d6cc307b767556cd99fa7ee77f16
-
SHA512
2fab9baee8221ee5f93623b7bcfbe8db061df2729e0fa530eb9f353c6cff80270e187548eb6fc3db102e9a255c29ed5884d655488fbf1a482921f7b58a1e2e26
-
SSDEEP
98304:1OndwcEvG+FCdZggUjB+mbKWk6q9Ck8Z43xTkTi7b5XTUAIE+rYS+espx7:1OndEe+MXgdjB+mYUk8eATY9Tnax5Q
Malware Config
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
ElysiumStealer Support DLL 1 IoCs
resource yara_rule behavioral1/files/0x000d000000016fc9-39.dat elysiumstealer_dll -
Elysiumstealer family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ HWIDPERM.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions HWIDPERM.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools HWIDPERM.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HWIDPERM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HWIDPERM.exe -
Loads dropped DLL 1 IoCs
pid Process 2728 HWIDPERM.exe -
resource yara_rule behavioral1/memory/2728-28-0x0000000000400000-0x0000000000F4C000-memory.dmp themida behavioral1/memory/2728-29-0x0000000000400000-0x0000000000F4C000-memory.dmp themida -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA HWIDPERM.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum HWIDPERM.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 HWIDPERM.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2728 HWIDPERM.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HWIDPERM.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS HWIDPERM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer HWIDPERM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion HWIDPERM.exe -
Modifies system certificate store 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 HWIDPERM.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 HWIDPERM.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe 2728 HWIDPERM.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2728 HWIDPERM.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HWIDPERM.exe"C:\Users\Admin\AppData\Local\Temp\HWIDPERM.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD594173de2e35aa8d621fc1c4f54b2a082
SHA1fbb2266ee47f88462560f0370edb329554cd5869
SHA2567e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f
SHA512cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798