Analysis
-
max time kernel
149s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:14
Behavioral task
behavioral1
Sample
EFRTHMOFJM.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
EFRTHMOFJM.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
XSDG0CO4VFBO42HQ6UCC1AKsss.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
XSDG0CO4VFBO42HQ6UCC1AKsss.exe
Resource
win10v2004-20230220-en
General
-
Target
EFRTHMOFJM.dll
-
Size
13.8MB
-
MD5
99341e4d2fee0ae1400866d9d603b1f6
-
SHA1
6c6fd78580d600677a1c06dbb3c7c71693f4bff2
-
SHA256
272465dbf0d1c78ba32a92cd3a45876a68acd3cb34c7f7e0065bd2b83080c300
-
SHA512
83c00d998300f604fe9f576db473f2666f97bf09fd1551df76ccaf5f3b6fd99c1b0b0feabf0f1d2306983594f5b21a11022cf177ffc0341e2589ce900f87d61a
-
SSDEEP
196608:5RPbnMvO3xOB8/IscBeM0tKhFMHjNEnpOgPHSnZaKC/m1tb32w1Hio/wtvI9OvOQ:jrN/InbfLMpOgR1tJ1F/wBI8Q
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1704 rundll32.exe -
resource yara_rule behavioral2/memory/1704-133-0x0000000002030000-0x0000000004443000-memory.dmp themida behavioral2/memory/1704-134-0x0000000002030000-0x0000000004443000-memory.dmp themida behavioral2/memory/1704-135-0x0000000002030000-0x0000000004443000-memory.dmp themida behavioral2/memory/1704-136-0x0000000002030000-0x0000000004443000-memory.dmp themida behavioral2/memory/1704-137-0x0000000002030000-0x0000000004443000-memory.dmp themida behavioral2/memory/1704-138-0x0000000002030000-0x0000000004443000-memory.dmp themida behavioral2/memory/1704-139-0x0000000002030000-0x0000000004443000-memory.dmp themida behavioral2/memory/1704-140-0x0000000002030000-0x0000000004443000-memory.dmp themida behavioral2/memory/1704-141-0x0000000002030000-0x0000000004443000-memory.dmp themida behavioral2/memory/1704-142-0x0000000002030000-0x0000000004443000-memory.dmp themida behavioral2/memory/1704-143-0x0000000002030000-0x0000000004443000-memory.dmp themida behavioral2/memory/1704-144-0x0000000002030000-0x0000000004443000-memory.dmp themida behavioral2/memory/1704-169-0x0000000002030000-0x0000000004443000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1704 rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1576 1704 WerFault.exe 84 3032 1704 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1704 rundll32.exe 1704 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4240 wrote to memory of 1704 4240 rundll32.exe 84 PID 4240 wrote to memory of 1704 4240 rundll32.exe 84 PID 4240 wrote to memory of 1704 4240 rundll32.exe 84 PID 1704 wrote to memory of 1576 1704 rundll32.exe 88 PID 1704 wrote to memory of 1576 1704 rundll32.exe 88 PID 1704 wrote to memory of 1576 1704 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\EFRTHMOFJM.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\EFRTHMOFJM.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 7803⤵
- Program crash
PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 7803⤵
- Program crash
PID:3032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1704 -ip 17041⤵PID:1060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5d8f4ab8284f0fda871d6834e24bc6f37
SHA1641948e44a1dcfd0ef68910768eb4b1ea6b49d10
SHA256c09d0790e550694350b94ca6b077c54f983c135fab8990df5a75462804150912
SHA512f65a916041846718306567d33273c3d0f41e0b26589cf6db46ec6c788ba0d87a708c94979d3bd0609142badca9e7129690b92169a07dcf7cd8c66698827d2fa0