Analysis
-
max time kernel
90s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 05:08
Static task
static1
Behavioral task
behavioral1
Sample
6b987fa3ce0cfbc592d819bfd7ae7ffddfea58ecec59b92f54a012e272a23dc6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6b987fa3ce0cfbc592d819bfd7ae7ffddfea58ecec59b92f54a012e272a23dc6.dll
Resource
win10v2004-20220901-en
General
-
Target
6b987fa3ce0cfbc592d819bfd7ae7ffddfea58ecec59b92f54a012e272a23dc6.dll
-
Size
1.5MB
-
MD5
a8d6b38e2b27a2349c52f6697c901dac
-
SHA1
5addff19d2b6f94013881839589fafff851e82c8
-
SHA256
6b987fa3ce0cfbc592d819bfd7ae7ffddfea58ecec59b92f54a012e272a23dc6
-
SHA512
4d1a73ff8c0932f6e077548ff0d95ecea86cc3e0410c5b5ffd2dc5c911c67e45e1eaea57f0a1056273b8909aab86f904ac67a3f23466c109358f42f456b5d72f
-
SSDEEP
24576:p+Y9wzdAUJ8IfB4rEUiPJOokdfZAO/K5u5ZsjqZ2yCl0+IpHJJ9lCtTyF8+Y7afR:p+ywzdFJ8FrEU43/5ZqCpkH3MTyR+anR
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Wine rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3476 wrote to memory of 2400 3476 rundll32.exe 77 PID 3476 wrote to memory of 2400 3476 rundll32.exe 77 PID 3476 wrote to memory of 2400 3476 rundll32.exe 77
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6b987fa3ce0cfbc592d819bfd7ae7ffddfea58ecec59b92f54a012e272a23dc6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6b987fa3ce0cfbc592d819bfd7ae7ffddfea58ecec59b92f54a012e272a23dc6.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
PID:2400
-