Analysis
-
max time kernel
30s -
max time network
25s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
0c4f76087cc6e06c0f4c10b0328cb6f9.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c4f76087cc6e06c0f4c10b0328cb6f9.dll
Resource
win10v2004-20231222-en
General
-
Target
0c4f76087cc6e06c0f4c10b0328cb6f9.dll
-
Size
3.2MB
-
MD5
0c4f76087cc6e06c0f4c10b0328cb6f9
-
SHA1
b02ccb70119d0a5dad0443c4b3e97a9ded13cef1
-
SHA256
b701a1846b7b3e6ca66948586c336f107e1a2be79b03723bbb0c1632192c15ae
-
SHA512
d0688cdaaf496a5851c1aa08b9181781dfd9b4dde9d4e4329e584a595b3038df329ab7b2de4b17ca79d54c712483a293cdc018b4fb1bf4b776566602d521a7c6
-
SSDEEP
98304:eclj4CA/v4GbUHSrVsmpGM1JILgIFLiXKa:eclj4CA/pYSBGM7ArM6a
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Wine rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1772 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1772 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2376 wrote to memory of 1772 2376 rundll32.exe 28 PID 2376 wrote to memory of 1772 2376 rundll32.exe 28 PID 2376 wrote to memory of 1772 2376 rundll32.exe 28 PID 2376 wrote to memory of 1772 2376 rundll32.exe 28 PID 2376 wrote to memory of 1772 2376 rundll32.exe 28 PID 2376 wrote to memory of 1772 2376 rundll32.exe 28 PID 2376 wrote to memory of 1772 2376 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c4f76087cc6e06c0f4c10b0328cb6f9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c4f76087cc6e06c0f4c10b0328cb6f9.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1772
-