Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 00:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
45a6c57f8a7227958658a32bdaa867f3.dll
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
45a6c57f8a7227958658a32bdaa867f3.dll
-
Size
2.8MB
-
MD5
45a6c57f8a7227958658a32bdaa867f3
-
SHA1
785dd8400ed4489955ffbe332964eac11f69c500
-
SHA256
16d9f62af1708ebfd613da5aa4f6a4f6ce2f5273c339bbc939b4bbce9b643fd0
-
SHA512
ad264b2224320a0d100e5821529932ac6682fca1a93e235028bce47883ef365533ab0823e02a746a79ea01d8f883c9459ee3ff778e477b538cf2194142627bba
-
SSDEEP
49152:m/OuKcIW+edihb7eV2gQiNxXAruSZRzLZhl7yQOQ3ZnpC1d:TuKcRAc2OHAruSZRzLZHzOSZnpCj
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2180 2052 rundll32.exe 28 PID 2052 wrote to memory of 2180 2052 rundll32.exe 28 PID 2052 wrote to memory of 2180 2052 rundll32.exe 28 PID 2052 wrote to memory of 2180 2052 rundll32.exe 28 PID 2052 wrote to memory of 2180 2052 rundll32.exe 28 PID 2052 wrote to memory of 2180 2052 rundll32.exe 28 PID 2052 wrote to memory of 2180 2052 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\45a6c57f8a7227958658a32bdaa867f3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\45a6c57f8a7227958658a32bdaa867f3.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:2180
-