Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 07:39

General

  • Target

    7613d7fa04b0074ddd9ce38c22537f244c212eb118fa97f7451a280cffa7b31c.dll

  • Size

    706KB

  • MD5

    36c674ce043ec865cf020f621c3aae61

  • SHA1

    b888f8525759ca7fa71b75a4ed9457d4683125bf

  • SHA256

    7613d7fa04b0074ddd9ce38c22537f244c212eb118fa97f7451a280cffa7b31c

  • SHA512

    44cbc78833f07cb03f26a769b8684932aae66c78b91156733e3388237af120025605e1ad161bcc5acc16ef8e65cc6ce2b3ecf154bf4b88825f1876be13af5f29

  • SSDEEP

    12288:3pvcrpmLZKp32+aReKaHA45iMPIMizUV74oAyE+uLnzrKfSHZBe+jtIsLdjT9CDg:3FbKR2MbZiU1AyE+QvKfge+jtfJ9KxS

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\7613d7fa04b0074ddd9ce38c22537f244c212eb118fa97f7451a280cffa7b31c.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:812
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\7613d7fa04b0074ddd9ce38c22537f244c212eb118fa97f7451a280cffa7b31c.dll
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:552

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/552-56-0x0000000075131000-0x0000000075133000-memory.dmp

          Filesize

          8KB

        • memory/552-57-0x0000000001F00000-0x000000000207B000-memory.dmp

          Filesize

          1.5MB

        • memory/552-58-0x0000000077010000-0x0000000077190000-memory.dmp

          Filesize

          1.5MB

        • memory/812-54-0x000007FEFB6B1000-0x000007FEFB6B3000-memory.dmp

          Filesize

          8KB