Analysis
-
max time kernel
86s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 11:47
Static task
static1
Behavioral task
behavioral1
Sample
eb2b81440013395b4699d0520f2adcb797420ad2bb57e01e8e356fa3c4730e5d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
eb2b81440013395b4699d0520f2adcb797420ad2bb57e01e8e356fa3c4730e5d.dll
Resource
win10v2004-20220901-en
General
-
Target
eb2b81440013395b4699d0520f2adcb797420ad2bb57e01e8e356fa3c4730e5d.dll
-
Size
738KB
-
MD5
56898b83d6f2893dce5760b5b9692844
-
SHA1
141c12d74533c988fc571f0636d774a6155abd40
-
SHA256
eb2b81440013395b4699d0520f2adcb797420ad2bb57e01e8e356fa3c4730e5d
-
SHA512
7da70d5dbbab6a9b5dc7b79ac3650f9f79d858940ff4d59c29a990c558e765e00c33b278cc3c3aee2f91de2fe5d1030b781e85016952763218cdaf5de8a1db4c
-
SSDEEP
12288:cdOHNR54OayFgGLZ5xStM41YTdNNDaGMRD/rm47+hrbUk7EMP/lHBBaxSqnEQxKK:1ayFgOZ5xS6418btQDKA+hfHPlBBmSq7
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Wine rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Temp = "RUNDLL32.EXE C:\\Users\\Admin\\AppData\\Local\\Temp\\eb2b81440013395b4699d0520f2adcb797420ad2bb57e01e8e356fa3c4730e5d.dll,jxrdofkqvulqgbekvtsoxcpc" rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1128 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1128 rundll32.exe 1128 rundll32.exe 1128 rundll32.exe 1128 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1128 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1128 2032 rundll32.exe 26 PID 2032 wrote to memory of 1128 2032 rundll32.exe 26 PID 2032 wrote to memory of 1128 2032 rundll32.exe 26 PID 2032 wrote to memory of 1128 2032 rundll32.exe 26 PID 2032 wrote to memory of 1128 2032 rundll32.exe 26 PID 2032 wrote to memory of 1128 2032 rundll32.exe 26 PID 2032 wrote to memory of 1128 2032 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb2b81440013395b4699d0520f2adcb797420ad2bb57e01e8e356fa3c4730e5d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb2b81440013395b4699d0520f2adcb797420ad2bb57e01e8e356fa3c4730e5d.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1128
-