Analysis
-
max time kernel
29s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12/05/2023, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
cba26ae8f29cac3aa3e6b940cbb20d53ceed4ca346dbaaca02a493c556afb6cf.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cba26ae8f29cac3aa3e6b940cbb20d53ceed4ca346dbaaca02a493c556afb6cf.dll
Resource
win10v2004-20230220-en
General
-
Target
cba26ae8f29cac3aa3e6b940cbb20d53ceed4ca346dbaaca02a493c556afb6cf.dll
-
Size
1.2MB
-
MD5
9db6f66d9aeb383a336c2d4ab584767f
-
SHA1
8dde1f1ab0029d960fe06ad8bcf04da7d41bfb4c
-
SHA256
cba26ae8f29cac3aa3e6b940cbb20d53ceed4ca346dbaaca02a493c556afb6cf
-
SHA512
49102f72f03a4f4009d6f341cdfce9b4f91835d9a626ef2fdea15aa4afc95327362d68fb3d0016a1dfcfe38f4c22904ab2d3c1c4d3251311d8c0fc6e5667eda4
-
SSDEEP
24576:2Jq68ene4bok8ePeXq80OPE68RB1F3wWJnX0/iQ14v8E+2:2I5e5oX+OPERRB1F3wIvQ2h+2
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Wine rundll32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1716 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1716 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1716 2000 rundll32.exe 28 PID 2000 wrote to memory of 1716 2000 rundll32.exe 28 PID 2000 wrote to memory of 1716 2000 rundll32.exe 28 PID 2000 wrote to memory of 1716 2000 rundll32.exe 28 PID 2000 wrote to memory of 1716 2000 rundll32.exe 28 PID 2000 wrote to memory of 1716 2000 rundll32.exe 28 PID 2000 wrote to memory of 1716 2000 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cba26ae8f29cac3aa3e6b940cbb20d53ceed4ca346dbaaca02a493c556afb6cf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cba26ae8f29cac3aa3e6b940cbb20d53ceed4ca346dbaaca02a493c556afb6cf.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1716
-