Overview
overview
10Static
static
1000ad95ca93...0e.dll
windows7-x64
300ad95ca93...0e.dll
windows10-2004-x64
305d1b79186...c3.dll
windows7-x64
105d1b79186...c3.dll
windows10-2004-x64
12411b23bab...09.dll
windows7-x64
12411b23bab...09.dll
windows10-2004-x64
631d025c022...55.dll
windows7-x64
131d025c022...55.dll
windows10-2004-x64
53b0dce669a...1d.dll
windows7-x64
33b0dce669a...1d.dll
windows10-2004-x64
33ba484fd94...b7.dll
windows7-x64
13ba484fd94...b7.dll
windows10-2004-x64
1443c727f45...fd.dll
windows7-x64
9443c727f45...fd.dll
windows10-2004-x64
94bc3d95ee8...a2.dll
windows7-x64
14bc3d95ee8...a2.dll
windows10-2004-x64
64d81b964b8...53.dll
windows7-x64
14d81b964b8...53.dll
windows10-2004-x64
34fb5b0da3a...45.dll
windows7-x64
14fb5b0da3a...45.dll
windows10-2004-x64
550d0a3b32e...88.dll
windows7-x64
350d0a3b32e...88.dll
windows10-2004-x64
359f42ecde1...d1.dll
windows7-x64
159f42ecde1...d1.dll
windows10-2004-x64
105a76edd4bf...87.dll
windows7-x64
65a76edd4bf...87.dll
windows10-2004-x64
6610e854b8c...19.dll
windows7-x64
1610e854b8c...19.dll
windows10-2004-x64
5644a054d1f...bc.dll
windows7-x64
6644a054d1f...bc.dll
windows10-2004-x64
6802a953fdb...1f.dll
windows7-x64
9802a953fdb...1f.dll
windows10-2004-x64
9Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
29-06-2023 21:59
Behavioral task
behavioral1
Sample
00ad95ca939f4fbb3452ea300bb919ef18cbde843604d7148fa165b645c3030e.dll
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
00ad95ca939f4fbb3452ea300bb919ef18cbde843604d7148fa165b645c3030e.dll
Resource
win10v2004-20230621-en
Behavioral task
behavioral3
Sample
05d1b791865c9551ed8da6a170eb6f945a4d1e79cb70341f589cc47bacf78cc3.dll
Resource
win7-20230621-en
Behavioral task
behavioral4
Sample
05d1b791865c9551ed8da6a170eb6f945a4d1e79cb70341f589cc47bacf78cc3.dll
Resource
win10v2004-20230621-en
Behavioral task
behavioral5
Sample
2411b23bab7703e94897573f3758e1849fdc6f407ea1d1e5da20a4e07ecf3c09.dll
Resource
win7-20230621-en
Behavioral task
behavioral6
Sample
2411b23bab7703e94897573f3758e1849fdc6f407ea1d1e5da20a4e07ecf3c09.dll
Resource
win10v2004-20230621-en
Behavioral task
behavioral7
Sample
31d025c022dfa29f0d953d477a5cefebe91bf28e60fa771b407cc0b25dd65355.dll
Resource
win7-20230621-en
Behavioral task
behavioral8
Sample
31d025c022dfa29f0d953d477a5cefebe91bf28e60fa771b407cc0b25dd65355.dll
Resource
win10v2004-20230621-en
Behavioral task
behavioral9
Sample
3b0dce669a07626746d3b2301607702abd3bb2cba8dcb9c8b655f246e7b8ab1d.dll
Resource
win7-20230621-en
Behavioral task
behavioral10
Sample
3b0dce669a07626746d3b2301607702abd3bb2cba8dcb9c8b655f246e7b8ab1d.dll
Resource
win10v2004-20230621-en
Behavioral task
behavioral11
Sample
3ba484fd9430dda5ea691c86ed0cd6e95f1e401d7b444c0d6465545a03ae20b7.dll
Resource
win7-20230621-en
Behavioral task
behavioral12
Sample
3ba484fd9430dda5ea691c86ed0cd6e95f1e401d7b444c0d6465545a03ae20b7.dll
Resource
win10v2004-20230621-en
Behavioral task
behavioral13
Sample
443c727f45873a83f2b236cafa7781439e0ce9a25120d01621a812af15934ffd.dll
Resource
win7-20230621-en
Behavioral task
behavioral14
Sample
443c727f45873a83f2b236cafa7781439e0ce9a25120d01621a812af15934ffd.dll
Resource
win10v2004-20230621-en
Behavioral task
behavioral15
Sample
4bc3d95ee8661f7d381b2ceb6cb4a6e9759d7d0f9d883b44528b0f9c0aa559a2.dll
Resource
win7-20230621-en
Behavioral task
behavioral16
Sample
4bc3d95ee8661f7d381b2ceb6cb4a6e9759d7d0f9d883b44528b0f9c0aa559a2.dll
Resource
win10v2004-20230621-en
Behavioral task
behavioral17
Sample
4d81b964b809d1d3c642d331f17f80ee013fdd2b8bd2cffd191449313ea92353.dll
Resource
win7-20230621-en
Behavioral task
behavioral18
Sample
4d81b964b809d1d3c642d331f17f80ee013fdd2b8bd2cffd191449313ea92353.dll
Resource
win10v2004-20230621-en
Behavioral task
behavioral19
Sample
4fb5b0da3a557a7dac922010a2b888a91055c4381cf494a6336a674be3bb4a45.dll
Resource
win7-20230621-en
Behavioral task
behavioral20
Sample
4fb5b0da3a557a7dac922010a2b888a91055c4381cf494a6336a674be3bb4a45.dll
Resource
win10v2004-20230621-en
Behavioral task
behavioral21
Sample
50d0a3b32e813c671248f0f2fe10c3c237ee94bfa94fcaf86886fc3a64d79b88.dll
Resource
win7-20230621-en
Behavioral task
behavioral22
Sample
50d0a3b32e813c671248f0f2fe10c3c237ee94bfa94fcaf86886fc3a64d79b88.dll
Resource
win10v2004-20230621-en
Behavioral task
behavioral23
Sample
59f42ecde152f78731e54ea27e761bba748c9309a6ad1c2fd17f0e8b90f8aed1.dll
Resource
win7-20230621-en
Behavioral task
behavioral24
Sample
59f42ecde152f78731e54ea27e761bba748c9309a6ad1c2fd17f0e8b90f8aed1.dll
Resource
win10v2004-20230621-en
Behavioral task
behavioral25
Sample
5a76edd4bf074cc6a66199f87896dee330a81164d112605681ccb145d64cd587.dll
Resource
win7-20230621-en
Behavioral task
behavioral26
Sample
5a76edd4bf074cc6a66199f87896dee330a81164d112605681ccb145d64cd587.dll
Resource
win10v2004-20230621-en
Behavioral task
behavioral27
Sample
610e854b8c98ab9fd11985f3468eababee930d0bc695cc596f7a2b0e92b25f19.dll
Resource
win7-20230621-en
Behavioral task
behavioral28
Sample
610e854b8c98ab9fd11985f3468eababee930d0bc695cc596f7a2b0e92b25f19.dll
Resource
win10v2004-20230621-en
Behavioral task
behavioral29
Sample
644a054d1f42e129007fbe1ed445e1f36cc84737727e1d842530e16aec7c37bc.dll
Resource
win7-20230621-en
Behavioral task
behavioral30
Sample
644a054d1f42e129007fbe1ed445e1f36cc84737727e1d842530e16aec7c37bc.dll
Resource
win10v2004-20230621-en
Behavioral task
behavioral31
Sample
802a953fdb8efac8ec2a48bb8051713eb23edf962a10640d144206fea99b001f.dll
Resource
win7-20230621-en
Behavioral task
behavioral32
Sample
802a953fdb8efac8ec2a48bb8051713eb23edf962a10640d144206fea99b001f.dll
Resource
win10v2004-20230621-en
General
-
Target
802a953fdb8efac8ec2a48bb8051713eb23edf962a10640d144206fea99b001f.dll
-
Size
48KB
-
MD5
2ad7ceb9109d01f7750396e815d8aac5
-
SHA1
9310175104942dcfd34b8cdcdc94b2f648f1de31
-
SHA256
802a953fdb8efac8ec2a48bb8051713eb23edf962a10640d144206fea99b001f
-
SHA512
1ff923f206d2271b8e8afa2fdc550c4608b83d1d82a738489be31fb31562eb703ffdccf7789431321cc0ef8920f33cfd2c04393e2c04f22bf6f8ed8cdc9d50c1
-
SSDEEP
768:/0iEEBGU4Ly9RWFaoF4Vcps8etdvAgV1N:8iLBWLAWFad8eT4u1N
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Blocklisted process makes network request 6 IoCs
Processes:
rundll32.exeflow pid process 2 1660 rundll32.exe 5 1660 rundll32.exe 7 1660 rundll32.exe 9 1660 rundll32.exe 11 1660 rundll32.exe 13 1660 rundll32.exe -
Processes:
rundll32.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 rundll32.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
rundll32.exerundll32.execmd.exedescription pid process target process PID 1572 wrote to memory of 1660 1572 rundll32.exe rundll32.exe PID 1572 wrote to memory of 1660 1572 rundll32.exe rundll32.exe PID 1572 wrote to memory of 1660 1572 rundll32.exe rundll32.exe PID 1572 wrote to memory of 1660 1572 rundll32.exe rundll32.exe PID 1572 wrote to memory of 1660 1572 rundll32.exe rundll32.exe PID 1572 wrote to memory of 1660 1572 rundll32.exe rundll32.exe PID 1572 wrote to memory of 1660 1572 rundll32.exe rundll32.exe PID 1660 wrote to memory of 1656 1660 rundll32.exe cmd.exe PID 1660 wrote to memory of 1656 1660 rundll32.exe cmd.exe PID 1660 wrote to memory of 1656 1660 rundll32.exe cmd.exe PID 1660 wrote to memory of 1656 1660 rundll32.exe cmd.exe PID 1656 wrote to memory of 1528 1656 cmd.exe PING.EXE PID 1656 wrote to memory of 1528 1656 cmd.exe PING.EXE PID 1656 wrote to memory of 1528 1656 cmd.exe PING.EXE PID 1656 wrote to memory of 1528 1656 cmd.exe PING.EXE
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\802a953fdb8efac8ec2a48bb8051713eb23edf962a10640d144206fea99b001f.dll, DllRegisterServer1⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\802a953fdb8efac8ec2a48bb8051713eb23edf962a10640d144206fea99b001f.dll, DllRegisterServer2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Blocklisted process makes network request
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\cmd.execmd.exe /C "ping localhost && copy /b /y %SystemRoot%\System32\ActivationManager.dll %appdata%\Microsoft\nonresistantOutlivesDictatorial\AphroniaHaimavati.dll"3⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\PING.EXEping localhost4⤵
- Runs ping.exe
PID:1528
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e16cdc9cf5a7ae3c25a0d715a3b08670
SHA1233898f3faaba75a422a301ba50dbffcb03a71cf
SHA2560a591fa408aca10400eea60fb5ab3bd483d0b3ff49ed47cf8c5676e5105e3f49
SHA512bd6572e2aef77a2305d9b49b32ee70fceb6ff20b1ca3e37582fbdb08f65b935ff48e3bda66ffc0e991ce96d5e2128e17d7a6f3380be42f4c07e7db9d4bace863
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27