Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
18-12-2021 12:51
Static task
static1
Behavioral task
behavioral1
Sample
imgengine.dll
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
imgengine.dll
-
Size
12.0MB
-
MD5
ef7de8e17a46bbb875ff5b48a5111f75
-
SHA1
1758ad8c4574dc8aba71ef4e541dd78579853826
-
SHA256
4563e5ab64572adb62bc0e4e6c472b4c6485c9e5af3aa40dc17d84170c442e82
-
SHA512
0a7a0316856c766fb0ec8dae0519acb480d3e1c738c4a2ba442cb8cc5e67b920839ade09bc69e54eb406bb4575cae9fd1958512c25a826e134d4d036b744fd80
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Processes:
resource yara_rule behavioral2/memory/2708-120-0x0000000000400000-0x0000000002245000-memory.dmp themida behavioral2/memory/2708-121-0x0000000000400000-0x0000000002245000-memory.dmp themida behavioral2/memory/2708-122-0x0000000000400000-0x0000000002245000-memory.dmp themida behavioral2/memory/2708-123-0x0000000000400000-0x0000000002245000-memory.dmp themida behavioral2/memory/2708-124-0x0000000000400000-0x0000000002245000-memory.dmp themida -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
rundll32.exepid process 2708 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1428 2708 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 1428 WerFault.exe 1428 WerFault.exe 1428 WerFault.exe 1428 WerFault.exe 1428 WerFault.exe 1428 WerFault.exe 1428 WerFault.exe 1428 WerFault.exe 1428 WerFault.exe 1428 WerFault.exe 1428 WerFault.exe 1428 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1428 WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\imgengine.dll,#11⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2708 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2708 -s 5602⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428
-