Overview
overview
10Static
static
1casarowtt
windows7-x64
1casarowtt
windows10-2004-x64
1custsat.dll
windows7-x64
1custsat.dll
windows10-2004-x64
1dsssdvreeed55
windows7-x64
1dsssdvreeed55
windows10-2004-x64
1msvcr80.dll
windows7-x64
9msvcr80.dll
windows10-2004-x64
9windows.exe
windows7-x64
10windows.exe
windows10-2004-x64
10Analysis
-
max time kernel
133s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2023 13:16
Static task
static1
Behavioral task
behavioral1
Sample
casarowtt
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
casarowtt
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
custsat.dll
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
custsat.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
dsssdvreeed55
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
dsssdvreeed55
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
msvcr80.dll
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
msvcr80.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
windows.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
windows.exe
Resource
win10v2004-20230220-en
General
-
Target
msvcr80.dll
-
Size
3.6MB
-
MD5
201aab8f194ab13b82ca039a6a9e4a8e
-
SHA1
27275cdbf3b4e89430e2faa46ec40fd9790172e0
-
SHA256
de0c0334bd84c0b0f3d52b0181842263e46e4e7a3e3b5c3939cfc541c11a81e1
-
SHA512
d9c23e3eca7c4937239ec942d45be7a59938de4fed562c7d6c1d1c18746c96c90b099e7b58da876aaef88f2fd2197890a1fd91b6e57b97652767cbd066b90c22
-
SSDEEP
98304:p7N760QYYqZMfCG4KRZv9QdqXzKm0s4vB7v:ptmiMfb4KpQdmzIvB
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
rundll32.exepid process 3632 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2976 3632 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2888 wrote to memory of 3632 2888 rundll32.exe rundll32.exe PID 2888 wrote to memory of 3632 2888 rundll32.exe rundll32.exe PID 2888 wrote to memory of 3632 2888 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\msvcr80.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\msvcr80.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 6603⤵
- Program crash
PID:2976
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3632 -ip 36321⤵PID:1520