Analysis

  • max time kernel
    88s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 09:01

General

  • Target

    357245360ef30cd13daf47e182af50b1c0026f3bc959b9b997af20b7fe32e9f9.dll

  • Size

    733KB

  • MD5

    411ac5a51d56ca976def1d48f8e4bbd0

  • SHA1

    92ca9aed040667c8a17e2cbde9a81bace9364f7f

  • SHA256

    357245360ef30cd13daf47e182af50b1c0026f3bc959b9b997af20b7fe32e9f9

  • SHA512

    4bdcaf264c3f3808eab786c1086a113ea9c6c6c9588e4df588fa16c4953ee1d456220ff827697dce670ac7417b1cfe32d31f665bfd9fc3d141be87c98fb35423

  • SSDEEP

    12288:gBiYm72S8A62ZadO0htmdMzUeIQ3N9yKp6ARw0Z4cPVUCqoQsPlTqOhoeM4/JlPK:fhT812cTXzThx8m76cdnqollTqOSeM4v

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\357245360ef30cd13daf47e182af50b1c0026f3bc959b9b997af20b7fe32e9f9.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\357245360ef30cd13daf47e182af50b1c0026f3bc959b9b997af20b7fe32e9f9.dll,#1
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1564

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1564-55-0x0000000075681000-0x0000000075683000-memory.dmp

          Filesize

          8KB

        • memory/1564-56-0x0000000000870000-0x0000000000A0C000-memory.dmp

          Filesize

          1.6MB

        • memory/1564-58-0x00000000774D0000-0x0000000077650000-memory.dmp

          Filesize

          1.5MB

        • memory/1564-57-0x0000000000870000-0x0000000000A0C000-memory.dmp

          Filesize

          1.6MB

        • memory/1564-59-0x0000000000870000-0x0000000000A0C000-memory.dmp

          Filesize

          1.6MB

        • memory/1564-60-0x0000000000870000-0x0000000000A0C000-memory.dmp

          Filesize

          1.6MB