Analysis

  • max time kernel
    142s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    19-03-2023 18:14

General

  • Target

    BIHBXRSIVW.dll

  • Size

    14.5MB

  • MD5

    9c10a526a73893354ffda1070e3c438f

  • SHA1

    ce854ebd481c03df98625619bcc258614fc19515

  • SHA256

    9fc52a3f3062b09ef6fe25ceeead5bcf3f80c712e8468fe887a57fbe19884b2c

  • SHA512

    56f8cdfb10cbe024842390b7878e6cc83f4c644942d3785711310583c25499111e6427e1cb6954b17edf6db1ca9275d1e823ac5b32decfd62bddc13f1d624466

  • SSDEEP

    393216:y1+g8B3BQ6lV7Vb3LBgTovVLRAsDEI3mtPuQTC35BeI:y1Vs3BQmBFiMVLRAsYI3OGx

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Themida packer 15 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\BIHBXRSIVW.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\BIHBXRSIVW.dll,#1
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 332
        3⤵
        • Program crash
        PID:1704

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\29489780.dll

    Filesize

    8KB

    MD5

    d8f4ab8284f0fda871d6834e24bc6f37

    SHA1

    641948e44a1dcfd0ef68910768eb4b1ea6b49d10

    SHA256

    c09d0790e550694350b94ca6b077c54f983c135fab8990df5a75462804150912

    SHA512

    f65a916041846718306567d33273c3d0f41e0b26589cf6db46ec6c788ba0d87a708c94979d3bd0609142badca9e7129690b92169a07dcf7cd8c66698827d2fa0

  • memory/1956-62-0x0000000002240000-0x0000000004799000-memory.dmp

    Filesize

    37.3MB

  • memory/1956-61-0x0000000002240000-0x0000000004799000-memory.dmp

    Filesize

    37.3MB

  • memory/1956-58-0x0000000002240000-0x0000000004799000-memory.dmp

    Filesize

    37.3MB

  • memory/1956-57-0x0000000002240000-0x0000000004799000-memory.dmp

    Filesize

    37.3MB

  • memory/1956-63-0x0000000002240000-0x0000000004799000-memory.dmp

    Filesize

    37.3MB

  • memory/1956-60-0x0000000002240000-0x0000000004799000-memory.dmp

    Filesize

    37.3MB

  • memory/1956-56-0x0000000002240000-0x0000000004799000-memory.dmp

    Filesize

    37.3MB

  • memory/1956-54-0x0000000002240000-0x0000000004799000-memory.dmp

    Filesize

    37.3MB

  • memory/1956-59-0x0000000002240000-0x0000000004799000-memory.dmp

    Filesize

    37.3MB

  • memory/1956-64-0x0000000002240000-0x0000000004799000-memory.dmp

    Filesize

    37.3MB

  • memory/1956-66-0x0000000002240000-0x0000000004799000-memory.dmp

    Filesize

    37.3MB

  • memory/1956-67-0x0000000002240000-0x0000000004799000-memory.dmp

    Filesize

    37.3MB

  • memory/1956-69-0x0000000061E00000-0x0000000061EC1000-memory.dmp

    Filesize

    772KB

  • memory/1956-85-0x0000000002240000-0x0000000004799000-memory.dmp

    Filesize

    37.3MB

  • memory/1956-55-0x0000000002240000-0x0000000004799000-memory.dmp

    Filesize

    37.3MB

  • memory/1956-92-0x0000000002240000-0x0000000004799000-memory.dmp

    Filesize

    37.3MB