Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
114f248007b9d5c68c127a8652fc09a4.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
114f248007b9d5c68c127a8652fc09a4.dll
Resource
win10v2004-20231215-en
General
-
Target
114f248007b9d5c68c127a8652fc09a4.dll
-
Size
732KB
-
MD5
114f248007b9d5c68c127a8652fc09a4
-
SHA1
5e4bb2bc8105c9e1d0c3915efb74547e8ef816ab
-
SHA256
6d1d7936d8028ebd43f8e820c2e494ee607017858d151818a530cb84de166fd1
-
SHA512
c0302675c9a31909cee081ddcbec550f48f06b4413eb8e3adaef5b313280d1ee669e2d93a1d6cf8f4c8c2df714f03f56f181dae361c3d6316a2d0c0ccaa722b9
-
SSDEEP
12288:rPdXBQV370V9YGHXXQtzA+H22vUMOW40shlnutEn6NgeCekSWW11btA30:DdRQVL09lXQtzqQXsnnUgeCe711i
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Wine rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5080 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5080 rundll32.exe 5080 rundll32.exe 5080 rundll32.exe 5080 rundll32.exe 5080 rundll32.exe 5080 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5080 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 836 wrote to memory of 5080 836 rundll32.exe 14 PID 836 wrote to memory of 5080 836 rundll32.exe 14 PID 836 wrote to memory of 5080 836 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\114f248007b9d5c68c127a8652fc09a4.dll,#11⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5080
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\114f248007b9d5c68c127a8652fc09a4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:836