Analysis
-
max time kernel
41s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 13:55
Static task
static1
Behavioral task
behavioral1
Sample
c0a6c28345195508e28c0ec0b66b9649e6b1858f786ba19f4962ce54f98adc0d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c0a6c28345195508e28c0ec0b66b9649e6b1858f786ba19f4962ce54f98adc0d.dll
Resource
win10v2004-20221111-en
General
-
Target
c0a6c28345195508e28c0ec0b66b9649e6b1858f786ba19f4962ce54f98adc0d.dll
-
Size
1.2MB
-
MD5
0b290ad9a4c8ef3e240e8c1e921b4173
-
SHA1
8c6a277e702334c296773d314fac692560874f21
-
SHA256
c0a6c28345195508e28c0ec0b66b9649e6b1858f786ba19f4962ce54f98adc0d
-
SHA512
05792c6e1dabff8b973a3f7491c382b1bf3dad4a19421c113a911eb3bc910cc06a1c6361448c8fe35c20a50db06008f250952e34f82b4c65a26978395814b3fb
-
SSDEEP
24576:MQxzUuGtLwlJtRK91SgmDMbivYiUHhwj+sK8hAO8x:dDGZ82knY7ij+slg
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Wine rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1776 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1776 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1536 wrote to memory of 1776 1536 rundll32.exe 28 PID 1536 wrote to memory of 1776 1536 rundll32.exe 28 PID 1536 wrote to memory of 1776 1536 rundll32.exe 28 PID 1536 wrote to memory of 1776 1536 rundll32.exe 28 PID 1536 wrote to memory of 1776 1536 rundll32.exe 28 PID 1536 wrote to memory of 1776 1536 rundll32.exe 28 PID 1536 wrote to memory of 1776 1536 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0a6c28345195508e28c0ec0b66b9649e6b1858f786ba19f4962ce54f98adc0d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0a6c28345195508e28c0ec0b66b9649e6b1858f786ba19f4962ce54f98adc0d.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1776
-