Analysis

  • max time kernel
    112s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 07:39

General

  • Target

    7613d7fa04b0074ddd9ce38c22537f244c212eb118fa97f7451a280cffa7b31c.dll

  • Size

    706KB

  • MD5

    36c674ce043ec865cf020f621c3aae61

  • SHA1

    b888f8525759ca7fa71b75a4ed9457d4683125bf

  • SHA256

    7613d7fa04b0074ddd9ce38c22537f244c212eb118fa97f7451a280cffa7b31c

  • SHA512

    44cbc78833f07cb03f26a769b8684932aae66c78b91156733e3388237af120025605e1ad161bcc5acc16ef8e65cc6ce2b3ecf154bf4b88825f1876be13af5f29

  • SSDEEP

    12288:3pvcrpmLZKp32+aReKaHA45iMPIMizUV74oAyE+uLnzrKfSHZBe+jtIsLdjT9CDg:3FbKR2MbZiU1AyE+QvKfge+jtfJ9KxS

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\7613d7fa04b0074ddd9ce38c22537f244c212eb118fa97f7451a280cffa7b31c.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\7613d7fa04b0074ddd9ce38c22537f244c212eb118fa97f7451a280cffa7b31c.dll
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4760

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4760-133-0x0000000000AF0000-0x0000000000C6B000-memory.dmp

          Filesize

          1.5MB

        • memory/4760-134-0x0000000000AF0000-0x0000000000C6B000-memory.dmp

          Filesize

          1.5MB

        • memory/4760-135-0x00000000009B0000-0x0000000000A4D000-memory.dmp

          Filesize

          628KB

        • memory/4760-136-0x00000000777C0000-0x0000000077963000-memory.dmp

          Filesize

          1.6MB