Analysis
-
max time kernel
11s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
09/06/2022, 08:25
Static task
static1
Behavioral task
behavioral1
Sample
denev3r.dll
Resource
win7-20220414-en
General
-
Target
denev3r.dll
-
Size
1.6MB
-
MD5
69cd7700a687c190dcf824fee2a022b0
-
SHA1
2ee9d9dbca105772c8320ef4bfd437d9bf6664d0
-
SHA256
21bd2c88898f8fea3ba9dddb1c9e3cfb8f279d884099830dbda16acdde273587
-
SHA512
77b12b707ea334cde153a526d879086068f4134178b190b466e48c9c439828087a32187601879a095afeea33923a37de2345804b6c8d5eb478e45a28c0c0db25
Malware Config
Extracted
bumblebee
7rr
103.175.16.107:443
194.135.33.149:443
154.56.0.241:443
23.254.201.97:443
45.147.229.101:443
185.62.58.169:443
192.236.249.68:443
193.239.84.254:443
37.120.198.248:443
146.19.173.139:443
46.21.153.145:443
149.255.35.134:443
45.147.229.50:443
212.114.52.46:443
103.175.16.122:443
146.19.253.49:443
68.233.238.105:443
64.44.135.250:443
103.175.16.121:443
64.44.102.6:443
192.119.64.21:443
79.110.52.56:443
192.236.161.191:443
185.156.172.123:443
54.38.136.187:443
63.141.248.253:443
192.236.194.136:443
193.239.84.247:443
154.56.0.221:443
64.44.101.250:443
103.175.16.117:443
146.70.104.250:443
103.175.16.108:443
185.62.58.133:443
194.135.33.148:443
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo regsvr32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions regsvr32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\SOFTWARE\Wine regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe 864 regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\denev3r.dll1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
PID:864