Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 23:55
Static task
static1
Behavioral task
behavioral1
Sample
20c24a15781710e9cf0121c5f36f335c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20c24a15781710e9cf0121c5f36f335c.dll
Resource
win10v2004-20231215-en
General
-
Target
20c24a15781710e9cf0121c5f36f335c.dll
-
Size
923KB
-
MD5
20c24a15781710e9cf0121c5f36f335c
-
SHA1
4c47a3db81547e88085ba659c6b0093ac8215697
-
SHA256
6eee307788aa153b5be96830edd1cf85aa180afb5b6d5d7ff2d56e50fd553ce3
-
SHA512
37e55515f45d19ea09bf1d25c6100985bca8c18057c6779d29d2b336b454ca394dabc34f38ea691f4f02ef4cba38b595ed9ef19729fd974181fb7a8cad4a23b3
-
SSDEEP
24576:d0A9AbAnfpp0HLYVUlPiSVyAuOidZca5l/0sA:d0A9VnfpeYVUNZyArYfn8N
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Wine rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1832 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1832 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 624 wrote to memory of 1832 624 rundll32.exe 14 PID 624 wrote to memory of 1832 624 rundll32.exe 14 PID 624 wrote to memory of 1832 624 rundll32.exe 14 PID 624 wrote to memory of 1832 624 rundll32.exe 14 PID 624 wrote to memory of 1832 624 rundll32.exe 14 PID 624 wrote to memory of 1832 624 rundll32.exe 14 PID 624 wrote to memory of 1832 624 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\20c24a15781710e9cf0121c5f36f335c.dll,#11⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\20c24a15781710e9cf0121c5f36f335c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:624