Analysis
-
max time kernel
74s -
max time network
62s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30-06-2024 23:52
Behavioral task
behavioral1
Sample
veax_protected.exe
Resource
win7-20240508-en
windows7-x64
6 signatures
150 seconds
General
-
Target
veax_protected.exe
-
Size
3.8MB
-
MD5
386428b81e1a52e63f688e9ed323d066
-
SHA1
bd94ce6bd113d2f1b69af81244b268fda9d99160
-
SHA256
91bd58996da4433a6ce296547bea69861478b653117315831bfd825b2e4e0d3a
-
SHA512
d5b0d98a981f7ee2571ed2b4ed3932c71c0629676e9bbb7e3e457a347f029f1abe43b951c7e9430f0afc9f06bc886f28b198a828a837a2fd98fe5758ae35f15a
-
SSDEEP
49152:tI7WUD3/Bu/mJiKNUyGy8lPO3dpFwvq8zZ9TMit9nXIALJ95Z+0dVgBreCdz3xo2:tuvJiAGytb8Xpt9ICJ95BdVgJ1CH7Glj
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
veax_protected.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ veax_protected.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
veax_protected.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion veax_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion veax_protected.exe -
Processes:
resource yara_rule behavioral1/memory/1252-0-0x0000000140000000-0x0000000140A19000-memory.dmp themida behavioral1/memory/1252-2-0x0000000140000000-0x0000000140A19000-memory.dmp themida behavioral1/memory/1252-3-0x0000000140000000-0x0000000140A19000-memory.dmp themida behavioral1/memory/1252-4-0x0000000140000000-0x0000000140A19000-memory.dmp themida behavioral1/memory/1252-5-0x0000000140000000-0x0000000140A19000-memory.dmp themida -
Processes:
veax_protected.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA veax_protected.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
veax_protected.exepid process 1252 veax_protected.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
veax_protected.execmd.exedescription pid process target process PID 1252 wrote to memory of 2016 1252 veax_protected.exe cmd.exe PID 1252 wrote to memory of 2016 1252 veax_protected.exe cmd.exe PID 1252 wrote to memory of 2016 1252 veax_protected.exe cmd.exe PID 2016 wrote to memory of 2576 2016 cmd.exe certutil.exe PID 2016 wrote to memory of 2576 2016 cmd.exe certutil.exe PID 2016 wrote to memory of 2576 2016 cmd.exe certutil.exe PID 2016 wrote to memory of 2912 2016 cmd.exe find.exe PID 2016 wrote to memory of 2912 2016 cmd.exe find.exe PID 2016 wrote to memory of 2912 2016 cmd.exe find.exe PID 2016 wrote to memory of 2456 2016 cmd.exe find.exe PID 2016 wrote to memory of 2456 2016 cmd.exe find.exe PID 2016 wrote to memory of 2456 2016 cmd.exe find.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\veax_protected.exe"C:\Users\Admin\AppData\Local\Temp\veax_protected.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\veax_protected.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\veax_protected.exe" MD53⤵
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1252-1-0x00000000771E0000-0x00000000771E2000-memory.dmpFilesize
8KB
-
memory/1252-0-0x0000000140000000-0x0000000140A19000-memory.dmpFilesize
10.1MB
-
memory/1252-2-0x0000000140000000-0x0000000140A19000-memory.dmpFilesize
10.1MB
-
memory/1252-3-0x0000000140000000-0x0000000140A19000-memory.dmpFilesize
10.1MB
-
memory/1252-4-0x0000000140000000-0x0000000140A19000-memory.dmpFilesize
10.1MB
-
memory/1252-5-0x0000000140000000-0x0000000140A19000-memory.dmpFilesize
10.1MB