Analysis

  • max time kernel
    112s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 09:01

General

  • Target

    357245360ef30cd13daf47e182af50b1c0026f3bc959b9b997af20b7fe32e9f9.dll

  • Size

    733KB

  • MD5

    411ac5a51d56ca976def1d48f8e4bbd0

  • SHA1

    92ca9aed040667c8a17e2cbde9a81bace9364f7f

  • SHA256

    357245360ef30cd13daf47e182af50b1c0026f3bc959b9b997af20b7fe32e9f9

  • SHA512

    4bdcaf264c3f3808eab786c1086a113ea9c6c6c9588e4df588fa16c4953ee1d456220ff827697dce670ac7417b1cfe32d31f665bfd9fc3d141be87c98fb35423

  • SSDEEP

    12288:gBiYm72S8A62ZadO0htmdMzUeIQ3N9yKp6ARw0Z4cPVUCqoQsPlTqOhoeM4/JlPK:fhT812cTXzThx8m76cdnqollTqOSeM4v

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\357245360ef30cd13daf47e182af50b1c0026f3bc959b9b997af20b7fe32e9f9.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\357245360ef30cd13daf47e182af50b1c0026f3bc959b9b997af20b7fe32e9f9.dll,#1
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4240

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4240-133-0x0000000000400000-0x000000000059C000-memory.dmp

          Filesize

          1.6MB

        • memory/4240-134-0x00000000026D0000-0x000000000276D000-memory.dmp

          Filesize

          628KB

        • memory/4240-135-0x0000000000400000-0x000000000059C000-memory.dmp

          Filesize

          1.6MB

        • memory/4240-136-0x00000000772D0000-0x0000000077473000-memory.dmp

          Filesize

          1.6MB