Analysis
-
max time kernel
148s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 13:55
Static task
static1
Behavioral task
behavioral1
Sample
c0a6c28345195508e28c0ec0b66b9649e6b1858f786ba19f4962ce54f98adc0d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c0a6c28345195508e28c0ec0b66b9649e6b1858f786ba19f4962ce54f98adc0d.dll
Resource
win10v2004-20221111-en
General
-
Target
c0a6c28345195508e28c0ec0b66b9649e6b1858f786ba19f4962ce54f98adc0d.dll
-
Size
1.2MB
-
MD5
0b290ad9a4c8ef3e240e8c1e921b4173
-
SHA1
8c6a277e702334c296773d314fac692560874f21
-
SHA256
c0a6c28345195508e28c0ec0b66b9649e6b1858f786ba19f4962ce54f98adc0d
-
SHA512
05792c6e1dabff8b973a3f7491c382b1bf3dad4a19421c113a911eb3bc910cc06a1c6361448c8fe35c20a50db06008f250952e34f82b4c65a26978395814b3fb
-
SSDEEP
24576:MQxzUuGtLwlJtRK91SgmDMbivYiUHhwj+sK8hAO8x:dDGZ82knY7ij+slg
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Wine rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1840 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1840 rundll32.exe 1840 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4656 wrote to memory of 1840 4656 rundll32.exe 84 PID 4656 wrote to memory of 1840 4656 rundll32.exe 84 PID 4656 wrote to memory of 1840 4656 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0a6c28345195508e28c0ec0b66b9649e6b1858f786ba19f4962ce54f98adc0d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0a6c28345195508e28c0ec0b66b9649e6b1858f786ba19f4962ce54f98adc0d.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1840
-