Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25-03-2023 12:48
Static task
static1
Behavioral task
behavioral1
Sample
information.dll
Resource
win7-20230220-en
General
-
Target
information.dll
-
Size
2.0MB
-
MD5
c9216484a6371b055705ec5f4098ab01
-
SHA1
a13903e50408e11996159fba5f7deab1e73e8f08
-
SHA256
fed9bc8df9141f8f8f7a9203bc26b5b22123c154702fcd625379f2f7ecd31cb2
-
SHA512
64485bb8e1845a29f9d60343a0bd6fd8de4220aa83f3cd19eed47737642b79db2753106192798d495202e74016f2e845d161c1362ad09b01104f9cfb8c939359
-
SSDEEP
49152:G+MhMvcxBbQLsks2EWZs09Xl3ZF9EK99sq+Zy1RDZ5ko4Ebv5g7H11zLG0ZriPkb:G+Yu/ZTjLHS3bmdeQbzWIu78ph13l3bS
Malware Config
Extracted
bumblebee
146l
141.98.168.70:443
103.175.16.107:443
146.70.124.77:443
154.56.0.100:443
194.135.33.16:443
185.62.58.209:443
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo rundll32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ rundll32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions rundll32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\SOFTWARE\Wine rundll32.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN rundll32.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\information.dll,#11⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
PID:1088