Analysis
-
max time kernel
154s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09-02-2023 08:58
Static task
static1
Behavioral task
behavioral1
Sample
00gif.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
00gif.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
00gif.dll
-
Size
171KB
-
MD5
60827386e2d158fb3c2dff6ef19a6a3e
-
SHA1
7f687e70c319d419b91c85b4c8a027cae2876714
-
SHA256
4ad4b1410ed957d39985d24c613036f2b777dd2ed01a3ae7a9ab28e298f29ede
-
SHA512
a1a612af39d410ad6c5d17b016d8c0c9b4436203cc57616b436b18e40b715a4e80ab9b5419b4229b92a2a70e755a8eb41c8bda424fa503dc06ba5951f50a0bcc
-
SSDEEP
3072:8uZ6hcvJTZ9oVFBfnIyht8vPs1XQHBC92ePuH:dTN4HBnI2t8vPLu6
Score
9/10
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1664 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4776 PING.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2740 2376 regsvr32.exe 79 PID 2376 wrote to memory of 2740 2376 regsvr32.exe 79 PID 2376 wrote to memory of 2740 2376 regsvr32.exe 79 PID 2740 wrote to memory of 1664 2740 regsvr32.exe 80 PID 2740 wrote to memory of 1664 2740 regsvr32.exe 80 PID 2740 wrote to memory of 1664 2740 regsvr32.exe 80 PID 2740 wrote to memory of 5088 2740 regsvr32.exe 82 PID 2740 wrote to memory of 5088 2740 regsvr32.exe 82 PID 2740 wrote to memory of 5088 2740 regsvr32.exe 82 PID 5088 wrote to memory of 4776 5088 cmd.exe 84 PID 5088 wrote to memory of 4776 5088 cmd.exe 84 PID 5088 wrote to memory of 4776 5088 cmd.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\00gif.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\00gif.dll2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /F /TN "{8B30B3CD-2068-4F75-AB1F-FCAE6AF928B6}" /TR " cmd /q /c start /min \"\" powershell \"$nonresistantOutlivesDictatorial = Get-ItemProperty -Path HKCU:\Software\nonresistantOutlivesDictatorial; powershell -encodedcommand $nonresistantOutlivesDictatorial.AphroniaHaimavati \"" /SC MINUTE /MO 133⤵
- Creates scheduled task(s)
PID:1664
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C "ping localhost && DEL /F /S /Q /A C:\Users\Admin\AppData\Local\Temp\00gif.dll"3⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\PING.EXEping localhost4⤵
- Runs ping.exe
PID:4776
-
-
-