Analysis

  • max time kernel
    119s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 05:22

General

  • Target

    8ac3589984b82dad5e1eea3d4d8c53bf9e28967e3cfece5683d3ec558ae00ff6.dll

  • Size

    3.0MB

  • MD5

    a1907e94127ca408fb506656526ce745

  • SHA1

    6e8374fdaac04597da765cfcecee1f9fbc100cfd

  • SHA256

    8ac3589984b82dad5e1eea3d4d8c53bf9e28967e3cfece5683d3ec558ae00ff6

  • SHA512

    09783c2e1352e8b5a17cf2e04c4f0275790b9a7c7d3d578a8c189a943784b9309a309b262e6a20d1dc15af2a7a70055885e1f8c64c9fed6ac8904dd272a27fa2

  • SSDEEP

    49152:U5ceehonLGxSSAcInaX94Y4+GLEZ4Q75ZbMcferuAcdj+8GXg87zRNRlQZ2cPeA:UXZOSDcIneMbLEJ75ZbMcG8dj+8G9JiH

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8ac3589984b82dad5e1eea3d4d8c53bf9e28967e3cfece5683d3ec558ae00ff6.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8ac3589984b82dad5e1eea3d4d8c53bf9e28967e3cfece5683d3ec558ae00ff6.dll,#1
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1068-0-0x0000000010000000-0x00000000106E9000-memory.dmp

    Filesize

    6.9MB

  • memory/1068-1-0x0000000010000000-0x00000000106E9000-memory.dmp

    Filesize

    6.9MB

  • memory/1068-2-0x0000000010000000-0x00000000106E9000-memory.dmp

    Filesize

    6.9MB

  • memory/1068-3-0x00000000771A0000-0x00000000771A2000-memory.dmp

    Filesize

    8KB

  • memory/1068-4-0x0000000010000000-0x00000000106E9000-memory.dmp

    Filesize

    6.9MB

  • memory/1068-5-0x0000000010000000-0x00000000106E9000-memory.dmp

    Filesize

    6.9MB

  • memory/1068-6-0x0000000010000000-0x00000000106E9000-memory.dmp

    Filesize

    6.9MB

  • memory/1068-7-0x0000000010000000-0x00000000106E9000-memory.dmp

    Filesize

    6.9MB

  • memory/1068-9-0x0000000002310000-0x0000000002311000-memory.dmp

    Filesize

    4KB

  • memory/1068-8-0x0000000002450000-0x0000000002452000-memory.dmp

    Filesize

    8KB

  • memory/1068-10-0x0000000002730000-0x0000000002732000-memory.dmp

    Filesize

    8KB

  • memory/1068-11-0x00000000029E0000-0x00000000029E2000-memory.dmp

    Filesize

    8KB