Analysis
-
max time kernel
41s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 15:13
Behavioral task
behavioral1
Sample
Veax Free/serial.bat
Resource
win10v2004-20240611-en
General
-
Target
Veax Free/veax_protected.exe
-
Size
3.8MB
-
MD5
386428b81e1a52e63f688e9ed323d066
-
SHA1
bd94ce6bd113d2f1b69af81244b268fda9d99160
-
SHA256
91bd58996da4433a6ce296547bea69861478b653117315831bfd825b2e4e0d3a
-
SHA512
d5b0d98a981f7ee2571ed2b4ed3932c71c0629676e9bbb7e3e457a347f029f1abe43b951c7e9430f0afc9f06bc886f28b198a828a837a2fd98fe5758ae35f15a
-
SSDEEP
49152:tI7WUD3/Bu/mJiKNUyGy8lPO3dpFwvq8zZ9TMit9nXIALJ95Z+0dVgBreCdz3xo2:tuvJiAGytb8Xpt9ICJ95BdVgJ1CH7Glj
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
veax_protected.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ veax_protected.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
veax_protected.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion veax_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion veax_protected.exe -
Executes dropped EXE 1 IoCs
Processes:
value.exepid process 4072 value.exe -
Processes:
resource yara_rule behavioral2/memory/2560-0-0x0000000140000000-0x0000000140A19000-memory.dmp themida behavioral2/memory/2560-2-0x0000000140000000-0x0000000140A19000-memory.dmp themida behavioral2/memory/2560-3-0x0000000140000000-0x0000000140A19000-memory.dmp themida behavioral2/memory/2560-4-0x0000000140000000-0x0000000140A19000-memory.dmp themida behavioral2/memory/2560-5-0x0000000140000000-0x0000000140A19000-memory.dmp themida behavioral2/memory/2560-6-0x0000000140000000-0x0000000140A19000-memory.dmp themida behavioral2/memory/2560-8-0x0000000140000000-0x0000000140A19000-memory.dmp themida behavioral2/memory/2560-15-0x0000000140000000-0x0000000140A19000-memory.dmp themida -
Processes:
veax_protected.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA veax_protected.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
veax_protected.exepid process 2560 veax_protected.exe -
Drops file in Windows directory 1 IoCs
Processes:
veax_protected.exedescription ioc process File created C:\Windows\addins\value.exe veax_protected.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 668 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
veax_protected.execmd.exedescription pid process target process PID 2560 wrote to memory of 4532 2560 veax_protected.exe cmd.exe PID 2560 wrote to memory of 4532 2560 veax_protected.exe cmd.exe PID 4532 wrote to memory of 1028 4532 cmd.exe certutil.exe PID 4532 wrote to memory of 1028 4532 cmd.exe certutil.exe PID 4532 wrote to memory of 2980 4532 cmd.exe find.exe PID 4532 wrote to memory of 2980 4532 cmd.exe find.exe PID 4532 wrote to memory of 3184 4532 cmd.exe find.exe PID 4532 wrote to memory of 3184 4532 cmd.exe find.exe PID 2560 wrote to memory of 2504 2560 veax_protected.exe cmd.exe PID 2560 wrote to memory of 2504 2560 veax_protected.exe cmd.exe PID 2560 wrote to memory of 4072 2560 veax_protected.exe value.exe PID 2560 wrote to memory of 4072 2560 veax_protected.exe value.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Veax Free\veax_protected.exe"C:\Users\Admin\AppData\Local\Temp\Veax Free\veax_protected.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Veax Free\veax_protected.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Veax Free\veax_protected.exe" MD53⤵
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\addins\value.exe"C:\Windows\addins\value.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\addins\value.exeFilesize
175KB
MD5bce4229a024363528a835c0a76f05a46
SHA11ee8e741d6258a53a64cc370cf1f302de82e037d
SHA2564460a6a6bec0fcb7670ec628f04d69c201eab958bea0c71839afdad4e0caa8cb
SHA5125ba3811b14d4d5802eca881af7daf5c38bd46086d6cf0e81c80d5939a8d6d0c2f7e8040dd76ccc719f1aee94c6daf5d8584d735ed0bebb271684bdc978850d94
-
memory/2560-0-0x0000000140000000-0x0000000140A19000-memory.dmpFilesize
10.1MB
-
memory/2560-1-0x00007FFBDBE90000-0x00007FFBDC159000-memory.dmpFilesize
2.8MB
-
memory/2560-2-0x0000000140000000-0x0000000140A19000-memory.dmpFilesize
10.1MB
-
memory/2560-3-0x0000000140000000-0x0000000140A19000-memory.dmpFilesize
10.1MB
-
memory/2560-4-0x0000000140000000-0x0000000140A19000-memory.dmpFilesize
10.1MB
-
memory/2560-5-0x0000000140000000-0x0000000140A19000-memory.dmpFilesize
10.1MB
-
memory/2560-6-0x0000000140000000-0x0000000140A19000-memory.dmpFilesize
10.1MB
-
memory/2560-7-0x00007FFBDBE90000-0x00007FFBDC159000-memory.dmpFilesize
2.8MB
-
memory/2560-8-0x0000000140000000-0x0000000140A19000-memory.dmpFilesize
10.1MB
-
memory/2560-15-0x0000000140000000-0x0000000140A19000-memory.dmpFilesize
10.1MB
-
memory/2560-16-0x00007FFBDBE90000-0x00007FFBDC159000-memory.dmpFilesize
2.8MB