Overview
overview
7Static
static
AddinStockHGT.dll
windows7-x64
1AddinStockHGT.dll
windows10-2004-x64
1AddinTList.dll
windows7-x64
1AddinTList.dll
windows10-2004-x64
1AddinTradeBox.dll
windows7-x64
1AddinTradeBox.dll
windows10-2004-x64
1AddinUtility.dll
windows7-x64
1AddinUtility.dll
windows10-2004-x64
1AddinVipLc.dll
windows7-x64
1AddinVipLc.dll
windows10-2004-x64
1AddinYzzz.dll
windows7-x64
1AddinYzzz.dll
windows10-2004-x64
1GetMachineInfo.dll
windows7-x64
7GetMachineInfo.dll
windows10-2004-x64
7ePass2001API.dll
windows7-x64
1ePass2001API.dll
windows10-2004-x64
1Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
AddinStockHGT.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
AddinStockHGT.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
AddinTList.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
AddinTList.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
AddinTradeBox.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
AddinTradeBox.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
AddinUtility.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
AddinUtility.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
AddinVipLc.dll
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
AddinVipLc.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
AddinYzzz.dll
Resource
win7-20220901-en
Behavioral task
behavioral12
Sample
AddinYzzz.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
GetMachineInfo.dll
Resource
win7-20220901-en
Behavioral task
behavioral14
Sample
GetMachineInfo.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
ePass2001API.dll
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
ePass2001API.dll
Resource
win10v2004-20220812-en
General
-
Target
GetMachineInfo.dll
-
Size
166KB
-
MD5
a004915330a150f649e73d94b5c2e7ba
-
SHA1
ae1acefbf6a481ddc6e486e173d18be8c6e09a92
-
SHA256
cdf2c8378548e6a549f7d88a51d96cd917c655c8f368ff009d8ebf244c4e4dc1
-
SHA512
00ee6ab487bfa238835d865ad4fdf9422caa8a594afe2bc8c0b268468b3dcf6f553ac5c4a5d259aa1bcfa2c3a56b95be4f26691dc1b1a3baeab769c608ebcf1d
-
SSDEEP
1536:0WpUUJT60s+PVTxgvbaJ+XoT/hHy39DlPgjHCw6/OaH85pBlBbtU6hD28iT7bpgr:0T+e3l+J2oTA9BPuQOJNlJ26hViTxgr
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1300 840 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1000 wrote to memory of 840 1000 rundll32.exe 27 PID 1000 wrote to memory of 840 1000 rundll32.exe 27 PID 1000 wrote to memory of 840 1000 rundll32.exe 27 PID 1000 wrote to memory of 840 1000 rundll32.exe 27 PID 1000 wrote to memory of 840 1000 rundll32.exe 27 PID 1000 wrote to memory of 840 1000 rundll32.exe 27 PID 1000 wrote to memory of 840 1000 rundll32.exe 27 PID 840 wrote to memory of 1300 840 rundll32.exe 28 PID 840 wrote to memory of 1300 840 rundll32.exe 28 PID 840 wrote to memory of 1300 840 rundll32.exe 28 PID 840 wrote to memory of 1300 840 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\GetMachineInfo.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\GetMachineInfo.dll,#12⤵
- Checks BIOS information in registry
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 2323⤵
- Program crash
PID:1300
-
-