Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
ac486401b12a9edf2153035147577adeac73db79375625f13f4c39f9422a7166.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ac486401b12a9edf2153035147577adeac73db79375625f13f4c39f9422a7166.dll
Resource
win10v2004-20230915-en
General
-
Target
ac486401b12a9edf2153035147577adeac73db79375625f13f4c39f9422a7166.dll
-
Size
4.3MB
-
MD5
ebe933ef7cfd469c32ae9645ea2de327
-
SHA1
f72c79bfa7abba76afc8eecf72c42fafdd9f050f
-
SHA256
ac486401b12a9edf2153035147577adeac73db79375625f13f4c39f9422a7166
-
SHA512
68d50731f7920ba99f98eaa1c682198b5aa55ce8a7bb5cc3532adee755c82c233f6a04f894e9187daa3a9b094d0a007f615a8fb98d76e0051225245ee0883e71
-
SSDEEP
98304:PfhMoQk11rKLeOWOSOeytPnHjDD3d0CHYzxZjgImUZ/Cqw1Xp1WT6Zy7mbPqkSk:HWZP9/eytPHT3Mnjg3kq9ZxbPAk
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2972 rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac486401b12a9edf2153035147577adeac73db79375625f13f4c39f9422a7166.dll,#11⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2972