Analysis
-
max time kernel
88s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
357245360ef30cd13daf47e182af50b1c0026f3bc959b9b997af20b7fe32e9f9.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
357245360ef30cd13daf47e182af50b1c0026f3bc959b9b997af20b7fe32e9f9.dll
Resource
win10v2004-20220812-en
General
-
Target
357245360ef30cd13daf47e182af50b1c0026f3bc959b9b997af20b7fe32e9f9.dll
-
Size
733KB
-
MD5
411ac5a51d56ca976def1d48f8e4bbd0
-
SHA1
92ca9aed040667c8a17e2cbde9a81bace9364f7f
-
SHA256
357245360ef30cd13daf47e182af50b1c0026f3bc959b9b997af20b7fe32e9f9
-
SHA512
4bdcaf264c3f3808eab786c1086a113ea9c6c6c9588e4df588fa16c4953ee1d456220ff827697dce670ac7417b1cfe32d31f665bfd9fc3d141be87c98fb35423
-
SSDEEP
12288:gBiYm72S8A62ZadO0htmdMzUeIQ3N9yKp6ARw0Z4cPVUCqoQsPlTqOhoeM4/JlPK:fhT812cTXzThx8m76cdnqollTqOSeM4v
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Wine rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Temp = "RUNDLL32.EXE C:\\Users\\Admin\\AppData\\Local\\Temp\\357245360ef30cd13daf47e182af50b1c0026f3bc959b9b997af20b7fe32e9f9.dll,EnumDateFormatsExEx" rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1564 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1564 rundll32.exe 1564 rundll32.exe 1564 rundll32.exe 1564 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1564 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1536 wrote to memory of 1564 1536 rundll32.exe 26 PID 1536 wrote to memory of 1564 1536 rundll32.exe 26 PID 1536 wrote to memory of 1564 1536 rundll32.exe 26 PID 1536 wrote to memory of 1564 1536 rundll32.exe 26 PID 1536 wrote to memory of 1564 1536 rundll32.exe 26 PID 1536 wrote to memory of 1564 1536 rundll32.exe 26 PID 1536 wrote to memory of 1564 1536 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\357245360ef30cd13daf47e182af50b1c0026f3bc959b9b997af20b7fe32e9f9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\357245360ef30cd13daf47e182af50b1c0026f3bc959b9b997af20b7fe32e9f9.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1564
-