Analysis
-
max time kernel
105s -
max time network
108s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
19-09-2021 11:55
Static task
static1
Behavioral task
behavioral1
Sample
f47bc123831a1855a959fbf51b4138683af7bbbde13ad9f164594d2aa6516791.bin.dll
Resource
win7-en-20210916
windows7_x64
0 signatures
0 seconds
General
-
Target
f47bc123831a1855a959fbf51b4138683af7bbbde13ad9f164594d2aa6516791.bin.dll
-
Size
7.1MB
-
MD5
473b4e622b982a92cba1ba8afcda8273
-
SHA1
9a7a192b67895f63f1afdf5adf7ba2d195a17d80
-
SHA256
f47bc123831a1855a959fbf51b4138683af7bbbde13ad9f164594d2aa6516791
-
SHA512
bd437fa921c6e2c74d8c8aacc94daf2a560f90ad0fde54004902eb55b009bd705aa9e58e27e49e16f32f962302363e7991af59ba212be0f438909dc5be6032b0
Malware Config
Signatures
-
Detect Numando Payload 2 IoCs
resource yara_rule behavioral2/memory/64-115-0x0000000004A90000-0x000000000538D000-memory.dmp family_numando behavioral2/memory/64-116-0x0000000004A91000-0x0000000004D4C000-memory.dmp family_numando -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
resource yara_rule behavioral2/memory/64-115-0x0000000004A90000-0x000000000538D000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1276 64 WerFault.exe 68 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1276 WerFault.exe Token: SeBackupPrivilege 1276 WerFault.exe Token: SeDebugPrivilege 1276 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1096 wrote to memory of 64 1096 rundll32.exe 68 PID 1096 wrote to memory of 64 1096 rundll32.exe 68 PID 1096 wrote to memory of 64 1096 rundll32.exe 68
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f47bc123831a1855a959fbf51b4138683af7bbbde13ad9f164594d2aa6516791.bin.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f47bc123831a1855a959fbf51b4138683af7bbbde13ad9f164594d2aa6516791.bin.dll,#12⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:64 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 7243⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-