Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
11-04-2022 16:15
Static task
static1
Behavioral task
behavioral1
Sample
document.lnk
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
document.lnk
Resource
win10v2004-20220331-en
Behavioral task
behavioral3
Sample
vil.dll
Resource
win7-20220331-en
Behavioral task
behavioral4
Sample
vil.dll
Resource
win10v2004-20220331-en
General
-
Target
document.lnk
-
Size
823B
-
MD5
535f612cd22942a8f831c8f08cd880b5
-
SHA1
b095440d2c2868cbfb0e95ec32da10dd9f2aea48
-
SHA256
a03ac8dc616ac88e9aca6efe1171dd962df0895935ac1df637533fe6c40a8ca8
-
SHA512
725e3650ae1724edf247afb5e2c809cb0d277ac887df6f9ca9f03d9386958eac7b07908e91c6cc4fe757a0ed314221d539fff29f48037c56444d8298c2820ea4
Malware Config
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-594401021-1341801952-2355885667-1000\SOFTWARE\Wine rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe 1004 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1544 wrote to memory of 1772 1544 cmd.exe 29 PID 1544 wrote to memory of 1772 1544 cmd.exe 29 PID 1544 wrote to memory of 1772 1544 cmd.exe 29 PID 1772 wrote to memory of 1004 1772 cmd.exe 30 PID 1772 wrote to memory of 1004 1772 cmd.exe 30 PID 1772 wrote to memory of 1004 1772 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\document.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start rundll32 vil.dll,IternalJob2⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\system32\rundll32.exerundll32 vil.dll,IternalJob3⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
PID:1004
-
-