Analysis

  • max time kernel
    91s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-03-2023 18:36

General

  • Target

    BIHBXRSIVW.rCJ.dll

  • Size

    14.5MB

  • MD5

    9c10a526a73893354ffda1070e3c438f

  • SHA1

    ce854ebd481c03df98625619bcc258614fc19515

  • SHA256

    9fc52a3f3062b09ef6fe25ceeead5bcf3f80c712e8468fe887a57fbe19884b2c

  • SHA512

    56f8cdfb10cbe024842390b7878e6cc83f4c644942d3785711310583c25499111e6427e1cb6954b17edf6db1ca9275d1e823ac5b32decfd62bddc13f1d624466

  • SSDEEP

    393216:y1+g8B3BQ6lV7Vb3LBgTovVLRAsDEI3mtPuQTC35BeI:y1Vs3BQmBFiMVLRAsYI3OGx

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Themida packer 11 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\BIHBXRSIVW.rCJ.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\BIHBXRSIVW.rCJ.dll,#1
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1720
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 772
        3⤵
        • Program crash
        PID:4316
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1720 -ip 1720
    1⤵
      PID:3348

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\29489780.dll
      Filesize

      8KB

      MD5

      d8f4ab8284f0fda871d6834e24bc6f37

      SHA1

      641948e44a1dcfd0ef68910768eb4b1ea6b49d10

      SHA256

      c09d0790e550694350b94ca6b077c54f983c135fab8990df5a75462804150912

      SHA512

      f65a916041846718306567d33273c3d0f41e0b26589cf6db46ec6c788ba0d87a708c94979d3bd0609142badca9e7129690b92169a07dcf7cd8c66698827d2fa0

    • memory/1720-139-0x0000000002010000-0x0000000004569000-memory.dmp
      Filesize

      37.3MB

    • memory/1720-135-0x0000000002010000-0x0000000004569000-memory.dmp
      Filesize

      37.3MB

    • memory/1720-136-0x0000000002010000-0x0000000004569000-memory.dmp
      Filesize

      37.3MB

    • memory/1720-137-0x0000000002010000-0x0000000004569000-memory.dmp
      Filesize

      37.3MB

    • memory/1720-138-0x0000000002010000-0x0000000004569000-memory.dmp
      Filesize

      37.3MB

    • memory/1720-133-0x0000000002010000-0x0000000004569000-memory.dmp
      Filesize

      37.3MB

    • memory/1720-140-0x0000000002010000-0x0000000004569000-memory.dmp
      Filesize

      37.3MB

    • memory/1720-141-0x0000000002010000-0x0000000004569000-memory.dmp
      Filesize

      37.3MB

    • memory/1720-142-0x0000000002010000-0x0000000004569000-memory.dmp
      Filesize

      37.3MB

    • memory/1720-144-0x0000000061E00000-0x0000000061EC1000-memory.dmp
      Filesize

      772KB

    • memory/1720-134-0x0000000002010000-0x0000000004569000-memory.dmp
      Filesize

      37.3MB

    • memory/1720-167-0x0000000002010000-0x0000000004569000-memory.dmp
      Filesize

      37.3MB