Analysis
-
max time kernel
88s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 19:59
Behavioral task
behavioral1
Sample
Growpai.dll
Resource
win7-20230220-en
windows7-x64
10 signatures
150 seconds
General
-
Target
Growpai.dll
-
Size
4.8MB
-
MD5
7f3c2aed44eb710ed0f624f3d4bb665e
-
SHA1
8389c33e975681201900eab75b4d8d34fca52000
-
SHA256
b08d00a9eba33a30059541904152d59655c7354316966fdd58090aae59958dd3
-
SHA512
82fa8eefb4d9086bab8995d4586f73022f4e90170b1f758909f2c6d564c82f35e12fcda6aa1b514c0ea2d21ef356376a1229aae71217a591194eb3b015c7c115
-
SSDEEP
98304:4FSydiu3WTYUHPFH7DKIE0hTBs4hQl2aRa5pi8SS0B71pi:40RxTBHPJDKPqBs4CR2ES0Bi
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Processes:
resource yara_rule behavioral2/memory/2184-133-0x00007FFBF7F60000-0x00007FFBF8BD2000-memory.dmp themida behavioral2/memory/2184-134-0x00007FFBF7F60000-0x00007FFBF8BD2000-memory.dmp themida behavioral2/memory/2184-135-0x00007FFBF7F60000-0x00007FFBF8BD2000-memory.dmp themida behavioral2/memory/2184-136-0x00007FFBF7F60000-0x00007FFBF8BD2000-memory.dmp themida behavioral2/memory/2184-137-0x00007FFBF7F60000-0x00007FFBF8BD2000-memory.dmp themida behavioral2/memory/2184-138-0x00007FFBF7F60000-0x00007FFBF8BD2000-memory.dmp themida behavioral2/memory/2184-139-0x00007FFBF7F60000-0x00007FFBF8BD2000-memory.dmp themida behavioral2/memory/2184-140-0x00007FFBF7F60000-0x00007FFBF8BD2000-memory.dmp themida -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
rundll32.exepid process 2184 rundll32.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2184-133-0x00007FFBF7F60000-0x00007FFBF8BD2000-memory.dmpFilesize
12.4MB
-
memory/2184-134-0x00007FFBF7F60000-0x00007FFBF8BD2000-memory.dmpFilesize
12.4MB
-
memory/2184-135-0x00007FFBF7F60000-0x00007FFBF8BD2000-memory.dmpFilesize
12.4MB
-
memory/2184-136-0x00007FFBF7F60000-0x00007FFBF8BD2000-memory.dmpFilesize
12.4MB
-
memory/2184-137-0x00007FFBF7F60000-0x00007FFBF8BD2000-memory.dmpFilesize
12.4MB
-
memory/2184-138-0x00007FFBF7F60000-0x00007FFBF8BD2000-memory.dmpFilesize
12.4MB
-
memory/2184-139-0x00007FFBF7F60000-0x00007FFBF8BD2000-memory.dmpFilesize
12.4MB
-
memory/2184-140-0x00007FFBF7F60000-0x00007FFBF8BD2000-memory.dmpFilesize
12.4MB