Analysis
-
max time kernel
119s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 05:22
Static task
static1
Behavioral task
behavioral1
Sample
8ac3589984b82dad5e1eea3d4d8c53bf9e28967e3cfece5683d3ec558ae00ff6.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8ac3589984b82dad5e1eea3d4d8c53bf9e28967e3cfece5683d3ec558ae00ff6.dll
Resource
win10v2004-20230915-en
General
-
Target
8ac3589984b82dad5e1eea3d4d8c53bf9e28967e3cfece5683d3ec558ae00ff6.dll
-
Size
3.0MB
-
MD5
a1907e94127ca408fb506656526ce745
-
SHA1
6e8374fdaac04597da765cfcecee1f9fbc100cfd
-
SHA256
8ac3589984b82dad5e1eea3d4d8c53bf9e28967e3cfece5683d3ec558ae00ff6
-
SHA512
09783c2e1352e8b5a17cf2e04c4f0275790b9a7c7d3d578a8c189a943784b9309a309b262e6a20d1dc15af2a7a70055885e1f8c64c9fed6ac8904dd272a27fa2
-
SSDEEP
49152:U5ceehonLGxSSAcInaX94Y4+GLEZ4Q75ZbMcferuAcdj+8GXg87zRNRlQZ2cPeA:UXZOSDcIneMbLEJ75ZbMcG8dj+8G9JiH
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Wine rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1068 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1068 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1068 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 784 wrote to memory of 1068 784 rundll32.exe 30 PID 784 wrote to memory of 1068 784 rundll32.exe 30 PID 784 wrote to memory of 1068 784 rundll32.exe 30 PID 784 wrote to memory of 1068 784 rundll32.exe 30 PID 784 wrote to memory of 1068 784 rundll32.exe 30 PID 784 wrote to memory of 1068 784 rundll32.exe 30 PID 784 wrote to memory of 1068 784 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ac3589984b82dad5e1eea3d4d8c53bf9e28967e3cfece5683d3ec558ae00ff6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ac3589984b82dad5e1eea3d4d8c53bf9e28967e3cfece5683d3ec558ae00ff6.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1068
-