Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
15-11-2023 02:43
Behavioral task
behavioral1
Sample
360hbtheme.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
360hbtheme.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
360hbtheme.exe
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
360hbtheme.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
360hbthemeOrg.dll
Resource
win7-20231023-en
Behavioral task
behavioral6
Sample
360hbthemeOrg.dll
Resource
win10v2004-20231020-en
General
-
Target
360hbtheme.dll
-
Size
18.1MB
-
MD5
409837cc5ea19c916d8c14fd3739fd5e
-
SHA1
fced3169c6b3d43f14baab9659f99cd1e5cd563c
-
SHA256
6ebd682d580cd848e0b21db2d95d69a9a827f7faf1d5b6defc6f990f38aabcb3
-
SHA512
383fc3738462d211682c53be4a9622fd63998be1dc2be9a3bd1732ca1e79faf84c9bcf7ea806eeebe4f6f663b26b66bfc2a1f77e98f8cbf3e468482a430a1c99
-
SSDEEP
196608:pd5mDRzElNjBUXFFEUlc6+KQJmz84MisKkw4G/hAJdW:5URmNjOnTc6+V1is+BpAJU
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/2040-2-0x000007FEF3D00000-0x000007FEF4F42000-memory.dmp themida behavioral1/memory/2040-1-0x000007FEF3D00000-0x000007FEF4F42000-memory.dmp themida behavioral1/memory/2040-3-0x000007FEF3D00000-0x000007FEF4F42000-memory.dmp themida behavioral1/memory/2040-4-0x000007FEF3D00000-0x000007FEF4F42000-memory.dmp themida behavioral1/memory/2040-6-0x000007FEF3D00000-0x000007FEF4F42000-memory.dmp themida -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2040-0-0x000007FEF4F50000-0x000007FEF6192000-memory.dmpFilesize
18.3MB
-
memory/2040-2-0x000007FEF3D00000-0x000007FEF4F42000-memory.dmpFilesize
18.3MB
-
memory/2040-1-0x000007FEF3D00000-0x000007FEF4F42000-memory.dmpFilesize
18.3MB
-
memory/2040-3-0x000007FEF3D00000-0x000007FEF4F42000-memory.dmpFilesize
18.3MB
-
memory/2040-4-0x000007FEF3D00000-0x000007FEF4F42000-memory.dmpFilesize
18.3MB
-
memory/2040-5-0x000007FEF4F50000-0x000007FEF6192000-memory.dmpFilesize
18.3MB
-
memory/2040-6-0x000007FEF3D00000-0x000007FEF4F42000-memory.dmpFilesize
18.3MB
-
memory/2040-7-0x0000000001B00000-0x0000000001B37000-memory.dmpFilesize
220KB