Analysis
-
max time kernel
142s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 16:03
Static task
static1
Behavioral task
behavioral1
Sample
e6635b508fda10bcdac6c42de3393be098f24a5b66248f84ccd952388f3a50be.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e6635b508fda10bcdac6c42de3393be098f24a5b66248f84ccd952388f3a50be.dll
Resource
win10v2004-20220812-en
General
-
Target
e6635b508fda10bcdac6c42de3393be098f24a5b66248f84ccd952388f3a50be.dll
-
Size
1.2MB
-
MD5
8b2b9c0129c573553c2330cb6ee4fdee
-
SHA1
51114cdfa4ca12c56b6a9d5ab05673b683f87900
-
SHA256
e6635b508fda10bcdac6c42de3393be098f24a5b66248f84ccd952388f3a50be
-
SHA512
b7419c9a37dec951896e21415a89fcc9dea34941bd298e45b25f2814dee6f03ef4519339e641225b354646cb63170c25884775b2e3f7a3a2288c3a7e769a5383
-
SSDEEP
24576:J8xWGRs0FQUHFqQsPKpSq0Ohcy5udCgFIcsOWInbfyGUD:GW0TlHFqQ8Kf0Ohx5udzDsOWofzUD
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Wine rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1928 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1928 rundll32.exe 1928 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3452 wrote to memory of 1928 3452 rundll32.exe 81 PID 3452 wrote to memory of 1928 3452 rundll32.exe 81 PID 3452 wrote to memory of 1928 3452 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e6635b508fda10bcdac6c42de3393be098f24a5b66248f84ccd952388f3a50be.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e6635b508fda10bcdac6c42de3393be098f24a5b66248f84ccd952388f3a50be.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1928
-