Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 20:36

General

  • Target

    114f248007b9d5c68c127a8652fc09a4.dll

  • Size

    732KB

  • MD5

    114f248007b9d5c68c127a8652fc09a4

  • SHA1

    5e4bb2bc8105c9e1d0c3915efb74547e8ef816ab

  • SHA256

    6d1d7936d8028ebd43f8e820c2e494ee607017858d151818a530cb84de166fd1

  • SHA512

    c0302675c9a31909cee081ddcbec550f48f06b4413eb8e3adaef5b313280d1ee669e2d93a1d6cf8f4c8c2df714f03f56f181dae361c3d6316a2d0c0ccaa722b9

  • SSDEEP

    12288:rPdXBQV370V9YGHXXQtzA+H22vUMOW40shlnutEn6NgeCekSWW11btA30:DdRQVL09lXQtzqQXsnnUgeCe711i

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\SysWOW64\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\114f248007b9d5c68c127a8652fc09a4.dll,#1
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:5080
  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\114f248007b9d5c68c127a8652fc09a4.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:836

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/5080-0-0x0000000000400000-0x000000000059C000-memory.dmp

          Filesize

          1.6MB

        • memory/5080-1-0x0000000000B70000-0x0000000000C0D000-memory.dmp

          Filesize

          628KB

        • memory/5080-2-0x00000000778C4000-0x00000000778C6000-memory.dmp

          Filesize

          8KB

        • memory/5080-6-0x00000000038C0000-0x00000000038C1000-memory.dmp

          Filesize

          4KB

        • memory/5080-10-0x0000000003900000-0x0000000003901000-memory.dmp

          Filesize

          4KB

        • memory/5080-20-0x0000000003970000-0x0000000003971000-memory.dmp

          Filesize

          4KB

        • memory/5080-19-0x0000000003930000-0x0000000003931000-memory.dmp

          Filesize

          4KB

        • memory/5080-18-0x0000000003890000-0x0000000003891000-memory.dmp

          Filesize

          4KB

        • memory/5080-17-0x00000000039E0000-0x00000000039E1000-memory.dmp

          Filesize

          4KB

        • memory/5080-16-0x00000000038D0000-0x00000000038D1000-memory.dmp

          Filesize

          4KB

        • memory/5080-15-0x0000000003940000-0x0000000003941000-memory.dmp

          Filesize

          4KB

        • memory/5080-14-0x0000000003950000-0x0000000003951000-memory.dmp

          Filesize

          4KB

        • memory/5080-13-0x0000000003880000-0x0000000003881000-memory.dmp

          Filesize

          4KB

        • memory/5080-12-0x0000000003A00000-0x0000000003A01000-memory.dmp

          Filesize

          4KB

        • memory/5080-11-0x00000000038A0000-0x00000000038A1000-memory.dmp

          Filesize

          4KB

        • memory/5080-9-0x00000000038B0000-0x00000000038B1000-memory.dmp

          Filesize

          4KB

        • memory/5080-8-0x00000000038F0000-0x00000000038F1000-memory.dmp

          Filesize

          4KB

        • memory/5080-7-0x0000000003910000-0x0000000003912000-memory.dmp

          Filesize

          8KB

        • memory/5080-5-0x00000000038E0000-0x00000000038E1000-memory.dmp

          Filesize

          4KB

        • memory/5080-4-0x0000000003920000-0x0000000003921000-memory.dmp

          Filesize

          4KB

        • memory/5080-3-0x0000000000400000-0x000000000059C000-memory.dmp

          Filesize

          1.6MB

        • memory/5080-21-0x0000000000400000-0x000000000059C000-memory.dmp

          Filesize

          1.6MB

        • memory/5080-22-0x0000000000400000-0x000000000059C000-memory.dmp

          Filesize

          1.6MB

        • memory/5080-23-0x0000000000400000-0x000000000059C000-memory.dmp

          Filesize

          1.6MB

        • memory/5080-24-0x0000000000400000-0x000000000059C000-memory.dmp

          Filesize

          1.6MB

        • memory/5080-25-0x0000000000400000-0x000000000059C000-memory.dmp

          Filesize

          1.6MB

        • memory/5080-26-0x0000000000400000-0x000000000059C000-memory.dmp

          Filesize

          1.6MB

        • memory/5080-27-0x0000000000400000-0x000000000059C000-memory.dmp

          Filesize

          1.6MB

        • memory/5080-28-0x0000000000400000-0x000000000059C000-memory.dmp

          Filesize

          1.6MB

        • memory/5080-29-0x0000000000400000-0x000000000059C000-memory.dmp

          Filesize

          1.6MB

        • memory/5080-30-0x0000000000400000-0x000000000059C000-memory.dmp

          Filesize

          1.6MB

        • memory/5080-31-0x0000000000400000-0x000000000059C000-memory.dmp

          Filesize

          1.6MB

        • memory/5080-32-0x0000000000400000-0x000000000059C000-memory.dmp

          Filesize

          1.6MB

        • memory/5080-33-0x0000000000400000-0x000000000059C000-memory.dmp

          Filesize

          1.6MB

        • memory/5080-34-0x0000000000400000-0x000000000059C000-memory.dmp

          Filesize

          1.6MB

        • memory/5080-35-0x0000000000400000-0x000000000059C000-memory.dmp

          Filesize

          1.6MB

        • memory/5080-36-0x0000000000400000-0x000000000059C000-memory.dmp

          Filesize

          1.6MB