Analysis
-
max time kernel
105s -
max time network
108s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
19-09-2021 11:55
Static task
static1
Behavioral task
behavioral1
Sample
f47bc123831a1855a959fbf51b4138683af7bbbde13ad9f164594d2aa6516791.bin.dll
Resource
win7-en-20210916
windows7_x64
0 signatures
0 seconds
General
-
Target
f47bc123831a1855a959fbf51b4138683af7bbbde13ad9f164594d2aa6516791.bin.dll
-
Size
7.1MB
-
MD5
473b4e622b982a92cba1ba8afcda8273
-
SHA1
9a7a192b67895f63f1afdf5adf7ba2d195a17d80
-
SHA256
f47bc123831a1855a959fbf51b4138683af7bbbde13ad9f164594d2aa6516791
-
SHA512
bd437fa921c6e2c74d8c8aacc94daf2a560f90ad0fde54004902eb55b009bd705aa9e58e27e49e16f32f962302363e7991af59ba212be0f438909dc5be6032b0
Malware Config
Signatures
-
Detect Numando Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/64-115-0x0000000004A90000-0x000000000538D000-memory.dmp family_numando behavioral2/memory/64-116-0x0000000004A91000-0x0000000004D4C000-memory.dmp family_numando -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Processes:
resource yara_rule behavioral2/memory/64-115-0x0000000004A90000-0x000000000538D000-memory.dmp themida -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1276 64 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
WerFault.exepid process 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe 1276 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 1276 WerFault.exe Token: SeBackupPrivilege 1276 WerFault.exe Token: SeDebugPrivilege 1276 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1096 wrote to memory of 64 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 64 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 64 1096 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f47bc123831a1855a959fbf51b4138683af7bbbde13ad9f164594d2aa6516791.bin.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f47bc123831a1855a959fbf51b4138683af7bbbde13ad9f164594d2aa6516791.bin.dll,#12⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:64 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 7243⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-