Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 02:15

General

  • Target

    ac486401b12a9edf2153035147577adeac73db79375625f13f4c39f9422a7166.dll

  • Size

    4.3MB

  • MD5

    ebe933ef7cfd469c32ae9645ea2de327

  • SHA1

    f72c79bfa7abba76afc8eecf72c42fafdd9f050f

  • SHA256

    ac486401b12a9edf2153035147577adeac73db79375625f13f4c39f9422a7166

  • SHA512

    68d50731f7920ba99f98eaa1c682198b5aa55ce8a7bb5cc3532adee755c82c233f6a04f894e9187daa3a9b094d0a007f615a8fb98d76e0051225245ee0883e71

  • SSDEEP

    98304:PfhMoQk11rKLeOWOSOeytPnHjDD3d0CHYzxZjgImUZ/Cqw1Xp1WT6Zy7mbPqkSk:HWZP9/eytPHT3Mnjg3kq9ZxbPAk

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ac486401b12a9edf2153035147577adeac73db79375625f13f4c39f9422a7166.dll,#1
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:2972

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2972-0-0x0000000180000000-0x0000000180B73000-memory.dmp

          Filesize

          11.4MB

        • memory/2972-1-0x0000000180000000-0x0000000180B73000-memory.dmp

          Filesize

          11.4MB

        • memory/2972-2-0x0000000180000000-0x0000000180B73000-memory.dmp

          Filesize

          11.4MB

        • memory/2972-3-0x0000000180000000-0x0000000180B73000-memory.dmp

          Filesize

          11.4MB

        • memory/2972-4-0x0000000076DE0000-0x0000000076F89000-memory.dmp

          Filesize

          1.7MB

        • memory/2972-6-0x0000000180000000-0x0000000180B73000-memory.dmp

          Filesize

          11.4MB

        • memory/2972-7-0x0000000180000000-0x0000000180B73000-memory.dmp

          Filesize

          11.4MB

        • memory/2972-8-0x0000000180000000-0x0000000180B73000-memory.dmp

          Filesize

          11.4MB

        • memory/2972-9-0x0000000076DE0000-0x0000000076F89000-memory.dmp

          Filesize

          1.7MB