Analysis
-
max time kernel
119s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 02:57
Static task
static1
Behavioral task
behavioral1
Sample
0159696ef9569560cc2f46eb9fb05c10.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0159696ef9569560cc2f46eb9fb05c10.dll
Resource
win10v2004-20231215-en
General
-
Target
0159696ef9569560cc2f46eb9fb05c10.dll
-
Size
1.8MB
-
MD5
0159696ef9569560cc2f46eb9fb05c10
-
SHA1
5a197d802bda39b326c4cde65b889eaa1a368595
-
SHA256
e3577c7d8b7b4f8100e3e7d62fe1962e4bbd93ccd96f6d89e1558eacdaf719ec
-
SHA512
f2f885512db3d1a4e68f0388174223c09a1156ca5a6e1245c4d92125ab1591a0e201c05a9116f9ec8f217c2faefe33d7d25092fafdb5a77de4396b017510aae0
-
SSDEEP
49152:Po/sJNMEMonM1ys4ZqfsAQERkZPY5gBGtkAEmiryEkaO5EkAU:Qs/znM1eqUQRSPY53tfCFkZOkAU
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Wine rundll32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2780 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2780 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2780 2368 rundll32.exe 29 PID 2368 wrote to memory of 2780 2368 rundll32.exe 29 PID 2368 wrote to memory of 2780 2368 rundll32.exe 29 PID 2368 wrote to memory of 2780 2368 rundll32.exe 29 PID 2368 wrote to memory of 2780 2368 rundll32.exe 29 PID 2368 wrote to memory of 2780 2368 rundll32.exe 29 PID 2368 wrote to memory of 2780 2368 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0159696ef9569560cc2f46eb9fb05c10.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0159696ef9569560cc2f46eb9fb05c10.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2780
-