Analysis

  • max time kernel
    149s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 22:14

General

  • Target

    EFRTHMOFJM.dll

  • Size

    13.8MB

  • MD5

    99341e4d2fee0ae1400866d9d603b1f6

  • SHA1

    6c6fd78580d600677a1c06dbb3c7c71693f4bff2

  • SHA256

    272465dbf0d1c78ba32a92cd3a45876a68acd3cb34c7f7e0065bd2b83080c300

  • SHA512

    83c00d998300f604fe9f576db473f2666f97bf09fd1551df76ccaf5f3b6fd99c1b0b0feabf0f1d2306983594f5b21a11022cf177ffc0341e2589ce900f87d61a

  • SSDEEP

    196608:5RPbnMvO3xOB8/IscBeM0tKhFMHjNEnpOgPHSnZaKC/m1tb32w1Hio/wtvI9OvOQ:jrN/InbfLMpOgR1tJ1F/wBI8Q

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Themida packer 13 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\EFRTHMOFJM.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4240
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\EFRTHMOFJM.dll,#1
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 780
        3⤵
        • Program crash
        PID:1576
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 780
        3⤵
        • Program crash
        PID:3032
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1704 -ip 1704
    1⤵
      PID:1060

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\1f00381b.dll

            Filesize

            8KB

            MD5

            d8f4ab8284f0fda871d6834e24bc6f37

            SHA1

            641948e44a1dcfd0ef68910768eb4b1ea6b49d10

            SHA256

            c09d0790e550694350b94ca6b077c54f983c135fab8990df5a75462804150912

            SHA512

            f65a916041846718306567d33273c3d0f41e0b26589cf6db46ec6c788ba0d87a708c94979d3bd0609142badca9e7129690b92169a07dcf7cd8c66698827d2fa0

          • memory/1704-139-0x0000000002030000-0x0000000004443000-memory.dmp

            Filesize

            36.1MB

          • memory/1704-141-0x0000000002030000-0x0000000004443000-memory.dmp

            Filesize

            36.1MB

          • memory/1704-136-0x0000000002030000-0x0000000004443000-memory.dmp

            Filesize

            36.1MB

          • memory/1704-137-0x0000000002030000-0x0000000004443000-memory.dmp

            Filesize

            36.1MB

          • memory/1704-138-0x0000000002030000-0x0000000004443000-memory.dmp

            Filesize

            36.1MB

          • memory/1704-133-0x0000000002030000-0x0000000004443000-memory.dmp

            Filesize

            36.1MB

          • memory/1704-140-0x0000000002030000-0x0000000004443000-memory.dmp

            Filesize

            36.1MB

          • memory/1704-135-0x0000000002030000-0x0000000004443000-memory.dmp

            Filesize

            36.1MB

          • memory/1704-142-0x0000000002030000-0x0000000004443000-memory.dmp

            Filesize

            36.1MB

          • memory/1704-143-0x0000000002030000-0x0000000004443000-memory.dmp

            Filesize

            36.1MB

          • memory/1704-144-0x0000000002030000-0x0000000004443000-memory.dmp

            Filesize

            36.1MB

          • memory/1704-146-0x0000000061E00000-0x0000000061EC1000-memory.dmp

            Filesize

            772KB

          • memory/1704-134-0x0000000002030000-0x0000000004443000-memory.dmp

            Filesize

            36.1MB

          • memory/1704-169-0x0000000002030000-0x0000000004443000-memory.dmp

            Filesize

            36.1MB