Resubmissions

29-06-2024 19:07

240629-xs6grsteka 9

29-06-2024 18:39

240629-xa15bstbje 9

General

  • Target

    https://github.com//icsharpcode/ILSpy/releases/download/v9.0-preview2/ILSpy_selfcontained_9.0.0.7660-preview2-x64.zip

  • Sample

    240629-xs6grsteka

Malware Config

Targets

    • Target

      https://github.com//icsharpcode/ILSpy/releases/download/v9.0-preview2/ILSpy_selfcontained_9.0.0.7660-preview2-x64.zip

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

7
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

5
T1082

Peripheral Device Discovery

1
T1120

Command and Control

Web Service

1
T1102

Tasks