Analysis
-
max time kernel
112s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-07-2022 05:09
Static task
static1
Behavioral task
behavioral1
Sample
9fbdc3eb3cdb9d01986fe1c7391c35f3.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
9fbdc3eb3cdb9d01986fe1c7391c35f3.dll
-
Size
14.9MB
-
MD5
9fbdc3eb3cdb9d01986fe1c7391c35f3
-
SHA1
f8f72269cc647c6cad855fbc13aba400ef74d0d8
-
SHA256
b4736b94230d53ab0aa384868b7b00fa07427e18b9e8171f7b48c46ef2481c58
-
SHA512
a0921088358285f5c71e14c801fe6ba2960bae71ceb4cbba7f1e81ebd581efce4c7d68f59e7ebf21d41246936809f1fd6a5f5ceeacc73e5c818a8cddf9b45e11
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Processes:
resource yara_rule behavioral2/memory/3196-132-0x0000000002030000-0x0000000003666000-memory.dmp themida behavioral2/memory/3196-133-0x0000000002030000-0x0000000003666000-memory.dmp themida behavioral2/memory/3196-134-0x0000000002030000-0x0000000003666000-memory.dmp themida -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
rundll32.exepid process 3196 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4492 3196 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4060 wrote to memory of 3196 4060 rundll32.exe rundll32.exe PID 4060 wrote to memory of 3196 4060 rundll32.exe rundll32.exe PID 4060 wrote to memory of 3196 4060 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9fbdc3eb3cdb9d01986fe1c7391c35f3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9fbdc3eb3cdb9d01986fe1c7391c35f3.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 7763⤵
- Program crash
PID:4492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3196 -ip 31961⤵PID:4336
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3196-130-0x0000000000000000-mapping.dmp
-
memory/3196-131-0x0000000076F00000-0x00000000770A3000-memory.dmpFilesize
1.6MB
-
memory/3196-132-0x0000000002030000-0x0000000003666000-memory.dmpFilesize
22.2MB
-
memory/3196-133-0x0000000002030000-0x0000000003666000-memory.dmpFilesize
22.2MB
-
memory/3196-134-0x0000000002030000-0x0000000003666000-memory.dmpFilesize
22.2MB
-
memory/3196-135-0x0000000076F00000-0x00000000770A3000-memory.dmpFilesize
1.6MB