Resubmissions
14/06/2022, 09:00
220614-kycenahbg3 1014/06/2022, 08:57
220614-kwkcgsdadk 1014/06/2022, 08:39
220614-kkmcpshba2 1026/05/2022, 09:45
220526-lrcbraebfj 1026/05/2022, 03:54
220526-egaa3scacj 926/05/2022, 03:41
220526-d85evsbhfk 9Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
26/05/2022, 03:41
Static task
static1
Behavioral task
behavioral1
Sample
run.bat
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
run.bat
-
Size
66B
-
MD5
08a6b0f19f771bd800591a6bcfe63b42
-
SHA1
a76d6045a24b8fdf6ff038d28fbf0818cc70daac
-
SHA256
1a47a931685fad15ac28073e3c4c927e7d20408f9fee680258d7976d4955e4fb
-
SHA512
f7c8bddac1e15b4d7d3612b09f51023a71450c528213e2720ee4c62f7aa4a9693ca43a9a3d0fb66fe671439fa3cf5875b93a153104f7cedd89bedd69d69c996e
Score
9/10
Malware Config
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\SOFTWARE\Wine rundll32.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1160 wrote to memory of 908 1160 cmd.exe 29 PID 1160 wrote to memory of 908 1160 cmd.exe 29 PID 1160 wrote to memory of 908 1160 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\run.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\copy.dll,AWpWaxmOds2⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
PID:908
-