Analysis

  • max time kernel
    141s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 03:37

General

  • Target

    Heist Editor 3.6.3.1Community.exe

  • Size

    8.4MB

  • MD5

    e2a942481a3c1489bce0adea0bb9e8ce

  • SHA1

    29970574fe0f8c0f4597b4cd8c4694e9d746dd00

  • SHA256

    558a9fe5d58f6457f4d9fadd412c53e29d8748d41597df7c696f1353bd5a3f3f

  • SHA512

    18b1ad732b80f238f77ead0cb8ceabfcb54f8b766847abc748f4d273d2f7f03a56896efcee39f1f36c52c47db1526dbef5add33db5b996bed52e74556b1216ce

  • SSDEEP

    196608:RXdz2vbYWAsmIWCj6ckBVly956WZs80kcsn0ukU7p5:Hyv8UWTNyH6K6TsZP7p5

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 3 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 44 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Heist Editor 3.6.3.1Community.exe
    "C:\Users\Admin\AppData\Local\Temp\Heist Editor 3.6.3.1Community.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c explorer/select,C:\Users\Admin\HELanguage.hel
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Windows\explorer.exe
        explorer /select,C:\Users\Admin\HELanguage.hel
        3⤵
          PID:2664
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c start notepad C:\Users\Admin\HELanguage.hel
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Windows\system32\notepad.exe
          notepad C:\Users\Admin\HELanguage.hel
          3⤵
          • Opens file in notepad (likely ransom note)
          PID:2772
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2776

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Pre-OS Boot

    1
    T1542

    Bootkit

    1
    T1542.003

    Defense Evasion

    Virtualization/Sandbox Evasion

    1
    T1497

    Pre-OS Boot

    1
    T1542

    Bootkit

    1
    T1542.003

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    2
    T1012

    Virtualization/Sandbox Evasion

    1
    T1497

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\HELanguage.hel
      Filesize

      10KB

      MD5

      e48671f08c254445aab192942dbf6059

      SHA1

      e349a76d4d6562e81fb1b7cd9bec0a79a2adce4f

      SHA256

      7c642b8a501c94cd614f1178b2d11e3d39557ae5a26bd8e17e6c2a29f7790bcc

      SHA512

      d33216bd275286dfb8891b374e88e9f91bcb9f9dd50f6dbca298ae7cfabc92dfadab321f29845c2c612e2ef75e7b32c257f886ffad437eb3118bf112115b76f6

    • C:\Users\Admin\HEModel.hem
      Filesize

      1KB

      MD5

      5d1a149f3203d84bd7a15c0f33398732

      SHA1

      ffb7ce1713781e256a8318b00364c11ff8c2c245

      SHA256

      77fff2b08f004f4cb4d695063e4f08d55271a5ad93273391e9a9e47c32b7e190

      SHA512

      8ed13f99e8fde319f1369231b1886e67e7333a48dccd5a242a0e531f9efda788ea9389b41a2043886a84d61fd6c90119461840d2443478deb7c1a7a811279901

    • C:\Users\Admin\HEVehicle.hev
      Filesize

      114B

      MD5

      cf7f9aee23075a7915cb46cc438c794b

      SHA1

      7cd29eac5c4ca59ce23ccd3a51fd53d4ed3608d4

      SHA256

      fbfa926cc6ace7c9ebd9c4ec2003370e21aa2d580e624eaa262045cb034c85de

      SHA512

      bcfc09ff5a0d5a5a9723f2f15104342454211810ef99f99a4094c78bfdad2f85fefbfa295a00ee0c1aeb66d6f878fa9c123e6e8ac1b109bd81040cf4541fb5c6

    • C:\Users\Admin\HE_Config.hec
      Filesize

      71B

      MD5

      094acb45fe35409f4f9fa34365cda714

      SHA1

      afe86528e78075b38afbe92f9df4433aa5843932

      SHA256

      deae8f9d469a291e3d2e0fd8606153e6d29c3560a32786043e7fe0557955195e

      SHA512

      15576071836ccef7ddf13faebb58a2e0a40468539a364f76cb9683bc913f0dbd8d9106e8b8aed2d56dcd1368981f480ec80f21954da5661be8eb89c0ae686b11

    • memory/2776-18-0x0000000003A10000-0x0000000003A20000-memory.dmp
      Filesize

      64KB

    • memory/3016-7-0x000000013F390000-0x000000014083E000-memory.dmp
      Filesize

      20.7MB

    • memory/3016-10-0x000000013F390000-0x000000014083E000-memory.dmp
      Filesize

      20.7MB

    • memory/3016-9-0x000000013F390000-0x000000014083E000-memory.dmp
      Filesize

      20.7MB

    • memory/3016-6-0x000000013F390000-0x000000014083E000-memory.dmp
      Filesize

      20.7MB

    • memory/3016-8-0x000000013F390000-0x000000014083E000-memory.dmp
      Filesize

      20.7MB

    • memory/3016-5-0x000000013F390000-0x000000014083E000-memory.dmp
      Filesize

      20.7MB

    • memory/3016-2-0x0000000077150000-0x0000000077152000-memory.dmp
      Filesize

      8KB

    • memory/3016-4-0x000000013F390000-0x000000014083E000-memory.dmp
      Filesize

      20.7MB

    • memory/3016-3-0x000000013F390000-0x000000014083E000-memory.dmp
      Filesize

      20.7MB

    • memory/3016-1-0x000000013F390000-0x000000014083E000-memory.dmp
      Filesize

      20.7MB

    • memory/3016-22-0x000000013F390000-0x000000014083E000-memory.dmp
      Filesize

      20.7MB

    • memory/3016-23-0x000000013F390000-0x000000014083E000-memory.dmp
      Filesize

      20.7MB

    • memory/3016-25-0x000000013F390000-0x000000014083E000-memory.dmp
      Filesize

      20.7MB