Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27-03-2023 13:38
Static task
static1
Behavioral task
behavioral1
Sample
d0d45a3bc00989d91cde95cc8fba505915ae35fa6cba24d3b158938c18749f51.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d0d45a3bc00989d91cde95cc8fba505915ae35fa6cba24d3b158938c18749f51.dll
Resource
win10v2004-20230220-en
General
-
Target
d0d45a3bc00989d91cde95cc8fba505915ae35fa6cba24d3b158938c18749f51.dll
-
Size
2.5MB
-
MD5
a31d5556e895cbe1a28f9bd59032b4e1
-
SHA1
c6e9e5048fde97c700d08397c3ff85c725e2050e
-
SHA256
d0d45a3bc00989d91cde95cc8fba505915ae35fa6cba24d3b158938c18749f51
-
SHA512
637cd45f9c1eec75aa4bce5bcab866efce50a60d284354b7ea13d97e7b2aa86beb27c7eb94d1e6c889eac9f38e49caaee0949c4333d6c28b8638384f441f6e84
-
SSDEEP
49152:EECmPW03EQQfXQPTneDbBk2D21942MNv9bmz55BGxrwa1k3lFpz1:ZFhwGyDK2rXN1b45BG2aIT
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Wine rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1980 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1980 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1980 rundll32.exe Token: SeDebugPrivilege 1980 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1980 rundll32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1980 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1980 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1980 1064 rundll32.exe 27 PID 1064 wrote to memory of 1980 1064 rundll32.exe 27 PID 1064 wrote to memory of 1980 1064 rundll32.exe 27 PID 1064 wrote to memory of 1980 1064 rundll32.exe 27 PID 1064 wrote to memory of 1980 1064 rundll32.exe 27 PID 1064 wrote to memory of 1980 1064 rundll32.exe 27 PID 1064 wrote to memory of 1980 1064 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d0d45a3bc00989d91cde95cc8fba505915ae35fa6cba24d3b158938c18749f51.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d0d45a3bc00989d91cde95cc8fba505915ae35fa6cba24d3b158938c18749f51.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1980
-